Zoth - Rekt



Admin privileges - DeFi's favorite skeleton key for digital heists.

Zoth watched $8.4 million vanish into digital mist when their contract authority fell into the wrong hands, turning a real-world asset protocol into real-world losses on March 21st.

A carefully orchestrated contract swap, executed with surgical precision, transformed Zoth's vaults into an express lane for outbound funds.

Just three weeks after their March 1st $285k bloodletting, Zoth's March 21st dance with disaster proves some lessons cost more to learn than others.

From contract compromise to complete liquidation in minutes - DAI harvested, ETH acquired, attackers vanished.

When your admin keys become someone else's skeleton key, who's really in control of your protocol's vault?

Credit: John Doe, SlowMist, Cyvers, Zoth, Securrtech, SolidityScan

When the digital knives come out, on-chain sleuths sharpen theirs.

John Doe was first on the scene, catching the exploit in real-time and flagging the attack before looping in SlowMist to sound the alarm.

Security firms swarmed the blockchain wreckage.

SlowMist confirmed the exploit - admin keys bled out, leaving the contract wide open for a precision swap that sealed its fate.

Cyvers confirmed the kill shot moments later - pointing to the smoking proxy contract "USD0PPSubVaultUpgradeable," upgraded by the attacker's digital fingerprints just before the slaughter began.

The attack unfolded with mechanical efficiency - $8.4 million USD0++ tokens withdrawn, swapped for DAI, transferred to another address, all within minutes of the proxy contract upgrade.

Zoth's team finally surfaced, "Our system has experienced a security breach. We're actively investigating the incident and taking all necessary steps to resolve it as swiftly as possible."

Securrtech carved the incident into bite-sized pieces - compromised wallet, swapped contract, and funds drained before anyone could blink.

The blockchain breadcrumbs tell the story…

Attacker Address: 0x3b33c5Cd948Be5863b72cB3D6e9C0b36E67d01E5

Victim Address: 0x82f3a0392F58C50fa90542519832471BaE93e43e

Attack Transaction: 0x33bf669d125d11c432ac9b52b9d56161101c072fd8b0ac2aa390f5760fb50ca4

Final resting place: 0x7b0cd0D83565aDbB57585d0265b7D15d6D9f60cf

The attack - brutally effective, embarrassingly simple - another chapter in DeFi's never-ending admin key tragedy.

First the keys. Then the contract. Then the money.

Zoth's deployer wallet fell first.

8.85 million USD0++ tokens ($8.4M) vanished within minutes.

Convert to DAI. Transfer away. Ride off into the sunset.

No complex financial wizardry required - just god-mode admin access and stolen credentials.

When lightning strikes twice, the second bolt always hits harder.

Zoth's March 1st encounter with hackers - a mere $285k flesh wound - seems quaint compared to today's $8.4 million slaughter.

Their first exploit showcased actual technical skill - manipulating Uniswap V3 liquidity pools to exploit a logic flaw in LTV validation.

The attacker gamed the system to mint ZeUSD without sufficient collateral backing.

SolidityScan - Zoth's own auditor - published a detailed analysis of that earlier breach, warning of validation vulnerabilities that remained wide open.

Yet three weeks later, Zoth's death came not through complex financial wizardry, but through the most pedestrian of exploits - compromised admin credentials.

Same protocol. Different attack vectors.

Same result - users' funds redistributed to attackers' wallets.

An update from Zoth suggests this wasn’t just an opportunistic smash-and-grab.

The attacker stalked their prey for weeks, funding wallets and deploying contracts in multiple failed attempts before finally breaking through.

Asset issuers locked down 73% of Zoth’s TVL right after the breach, preventing an even bigger disaster.

They have onboarded Crystal Blockchain BV to investigate and will share a detailed report in the coming weeks.

The money’s gone, but Zoth isn’t ready to call it a loss just yet.

Protocols don’t beg, but they do bargain.

Zoth & Securr are putting up a $500k bounty - help track the $8.4M, and they’ll cut you in.

Follow the breadcrumbs, submit your findings, and if the funds get frozen, you’ll walk away with 10% of the take.

Yet as the bounty beckons, two hacks in three weeks can't be chalked up to mere misfortune.

Is it just bad luck or a glaring sign of systemic weakness?

Admin key compromises - DeFi's broken record that protocols keep dancing to.

No contract audit in existence could have saved Zoth from its $8.4 million digital execution.

The protocol's code wasn't the problem - the humans holding the keys were.

A growing graveyard of protocols have been sacrificed at the altar of lax key management.

The security theater continues - audits performed, vulnerabilities patched, while admin keys sit exposed like loaded guns on playground benches.

Perhaps protocols should start auditing the people who work for them - especially those whose fingerprints touch admin privileges.

With each exploit, the script remains unchanged - one compromised key, one malicious contract upgrade, one unstoppable cascade of vanishing funds.

Trustless finance, they said. So why do protocols treat admin keys like party favors?


bu makaleyi paylaş

REKT, anonim yazarlar için halka açık bir platform olarak hizmet eder, REKT'te bulunan görüşler veya içerik için hiçbir sorumluluk kabul etmiyoruz.

bağış yap (ETH / ERC20): 0x3C5c2F4bCeC51a36494682f91Dbc6cA7c63B514C

sorumluluk reddi:

REKT, Web Sitemizde veya hizmetlerimizle bağlantılı olarak web sitemizin ANON yazarı veya REKT tarafından gönderilen, yayınlanan veya neden olunan hiçbir içerikten hiçbir şekilde sorumlu veya yükümlü değildir. Anon yazarın davranışları ve gönderileri için kurallar sağlamamıza rağmen, onun web sitemizde veya hizmetlerimizde yayınladığı, ilettiği veya paylaştığı şeylerden sorumlu değiliz veya web sitemizde ve hizmetlerimizde karşılaşabileceğiniz herhangi bir saldırgan, uygunsuz, müstehcen, yasa dışı veya başka şekilde sakıncalı olan içerikten sorumlu değiliz. REKT, Web Sitemizin veya Hizmetlerimizin herhangi bir kullanıcısının çevrimiçi veya çevrimdışı davranışlarından sorumlu değildir.