【DeFi Hacking Review】💸 An oracle upgrade turned 8 decimal places into a $2.7 million withdrawal machine!!
📌 Event Summary:
- Victim:
#aevo (the old version of DeFi options vault of
#RibbonFinance ).
- Time: December 12, 2025.
- Loss Amount: Approximately $2.7 million.
- Core Reason: Caused by an oracle upgrade maintenance on December 6 by the officials.
⚡️ I have tried to explain this attack process in the simplest terms; if you don't have time, you can just look at the pictures! 👇🏼
1️⃣ Vulnerability Introduction:
This official upgrade not only mistakenly exposed key management permissions (transferOwnership and setImplementation were left unprotected) but also caused a mismatch in decimal precision between the old and new systems (18 vs 8).
2️⃣ Attack Preparation:
The hacker exploited the above precision vulnerability to create a special options product. This product had extremely low costs but appeared to be worth a fortune under the system's erroneous calculations.
3️⃣ Seizing Control:
The attacker used a "scapegoat" wallet (which met the tx.origin permission check vulnerability) to initiate transactions, successfully taking control of the oracle proxy admin.
4️⃣ Cycle Attack: Repeat this process
- Price Manipulation: The hacker obtained admin privileges and told the system: "Now the price of this asset is infinity".
- Withdrawal: The hacker took their low-cost "fake money" (malicious options) to cash out. The system paid the hacker real WETH and USDC at the erroneous high price.
- Cover-Up: After withdrawing, immediately change the price back, pretending nothing happened.
5️⃣ Money Laundering and Escape:
Dispersed the stolen money, washed it through Tornado Cash, and disappeared on-chain.
🌟 Summary: Therefore, every upgrade of
#智能合约 must be extremely careful! Not a single mistake can be made! ❌
Information data source: rekt.news 🙏🏻