Blockaid is a Web3 security tools stop malicious transactions before they happen, protecting web3 users from scams, phishing, and hacks.
according to Blockaid monitoring, an ongoing attack has occurred on Aftermath Finance's perpetual contract protocol on the Sui Network, with approximately $1.1 million worth of USDC stolen across 11 transactions within about 36 minutes. Analysis indicates the vulnerability stems from a fee accounting flaw in the perpetual contract liquidation system, which the attacker exploited to artificially inflate synthetic collateral and drain funds from the protocol's treasury.
According to on-chain security firm Blockaid (@blockaid_), AftermathFi’s perpetual contract on Sui Network was exploited via a vulnerability on April 29. The attacker (address: 0x1a65...2d41e) stole approximately $1.1 million in USDC across 11 transactions within roughly 36 minutes. The attack exploited a flaw in the perpetual contract liquidation fee calculation, enabling illicit withdrawals from the protocol’s treasury via synthetic collateral inflation.
Felix Leupold, Technical Lead of CoWSwap, posted an update on X stating that the CoWSwap frontend has been restored and users can now access it at swap.cow.finance. The official notice reminds users to authorize only the address 0xc92e8bdf79f0507f65a392b0ab4667716bfe0110 (i.e., the original GPv2VaultRelayer contract). Earlier, Blockaid reported that its system had detected an attack on the frontend of the decentralized exchange CowSwap; CoW Swap subsequently issued an announcement confirming a frontend outage and advising users not to transact on the platform temporarily.
According to official reports, the Blockaid system has detected a front-end attack targeting Cowswap, and the website COW[.]FI has been flagged as malicious. If your wallet is connected, immediately revoke permissions and avoid any interaction with this DApp.
according to Blockaid monitoring, an ongoing attack has occurred on Aftermath Finance's perpetual contract protocol on the Sui Network, with approximately $1.1 million worth of USDC stolen across 11 transactions within about 36 minutes. Analysis indicates the vulnerability stems from a fee accounting flaw in the perpetual contract liquidation system, which the attacker exploited to artificially inflate synthetic collateral and drain funds from the protocol's treasury.
According to on-chain security firm Blockaid (@blockaid_), AftermathFi’s perpetual contract on Sui Network was exploited via a vulnerability on April 29. The attacker (address: 0x1a65...2d41e) stole approximately $1.1 million in USDC across 11 transactions within roughly 36 minutes. The attack exploited a flaw in the perpetual contract liquidation fee calculation, enabling illicit withdrawals from the protocol’s treasury via synthetic collateral inflation.
Felix Leupold, Technical Lead of CoWSwap, posted an update on X stating that the CoWSwap frontend has been restored and users can now access it at swap.cow.finance. The official notice reminds users to authorize only the address 0xc92e8bdf79f0507f65a392b0ab4667716bfe0110 (i.e., the original GPv2VaultRelayer contract). Earlier, Blockaid reported that its system had detected an attack on the frontend of the decentralized exchange CowSwap; CoW Swap subsequently issued an announcement confirming a frontend outage and advising users not to transact on the platform temporarily.
According to official reports, the Blockaid system has detected a front-end attack targeting Cowswap, and the website COW[.]FI has been flagged as malicious. If your wallet is connected, immediately revoke permissions and avoid any interaction with this DApp.