- Newsletter Crypto Hack
- Posts
- KiloEx: Uncovering the $7.5 Million Oracle Exploit | Newsletter Crypto Hack
KiloEx: Uncovering the $7.5 Million Oracle Exploit | Newsletter Crypto Hack
A Deep Dive into the $7.5 Million KiloEx Oracle Exploit, Multi-Chain Vulnerabilities, Audit Failures, and the Ongoing Search for Accountability in Decentralized Finance (DeFi)
TL;DR
KiloEx suffered a $7.5 million exploit due to a critical oracle access control flaw. The attacker manipulated prices across multiple chains after funding via Tornado Cash. Despite five audits, the vulnerability went undetected. KiloEx has suspended operations, filed a police report, and is pursuing recovery while addressing security concerns post-incident.
KiloEx, a multi-chain perpetual protocol, suffered a significant security breach resulting in a $7.5 million loss after an attacker exploited a vulnerability in its oracle system.
The attack was executed through a wallet funded via Tornado Cash, enabling the perpetrator to bypass traceability. Despite its recent expansion across Base, BNB Chain, and Taiko, the protocol failed to address a critical flaw in its oracle implementation.
The exploit did not rely on a sophisticated zero-day vulnerability; instead, it capitalized on a basic oversight, described as “the digital equivalent of walking through an unlocked front door.”
This lapse occurred shortly after the project received support from Binance, highlighting the contrast between its public milestones and internal security posture.
In the aftermath, KiloEx offered a 10% bounty to the attacker in hopes of recovering the stolen funds. The incident raises concerns about the reliability of security practices in emerging DeFi platforms.
As the original commentary noted, “having ‘Kilo’ in your name doesn’t automatically give you the heavyweight security needed in DeFi’s bloodsport arena.”
The security breach at KiloEx escalated rapidly, with early warnings issued by security engineer Chaofan Shou on April 14th. Shou first reported that “KiloEx_perp is hacked. $6M+ loss already. Likely due to price oracle access control issues.”
Shortly thereafter, he confirmed the vulnerability: “Anyone can change Kilo’s price oracle.”
Within just 20 minutes of Shou’s initial alert, Cyvers Alerts corroborated the scale of the exploit, announcing a "$7M HACK ALERT" spanning multiple chains. The attack spread quickly from BNB Chain to Base and Taiko, draining funds at an alarming rate.
KiloEx responded hours later by suspending all platform activity and collaborating with security firms to trace the stolen funds. The incident revealed just how fragile KiloEx's security infrastructure was, particularly its oracle access controls, which allowed unrestricted manipulation of price feeds.
🚨 Security Incident Announcement: KiloEx Vault Exploit
Dear KiloEx Community,
We regret to inform you that the KiloEx Vault has been exploited. The attacker’s wallet address is:
0x00fac92881556a90fdb19eae9f23640b95b4bcbd
We urge all partner protocols and platforms to— KiloEx (@KiloEx_perp)
9:49 PM • Apr 14, 2025
The fallout demonstrates how a single overlooked vulnerability can trigger catastrophic losses across interconnected chains, turning what should have been a robust multi-chain deployment into a liability.
Exploit Details:
The exploit that led to KiloEx's $7.5 million loss required no advanced techniques, only a clear path through inadequate access controls.
According to an investigation by SlowMist, the breach stemmed from a flawed MinimalForwarder contract that failed to validate callers or verify signatures. This allowed the attacker to impersonate trusted contracts with ease.
The exploit relied on a chain of misplaced trust between four interconnected contracts: KiloPriceFeed relied on Keeper, Keeper relied on PositionKeeper, and PositionKeeper depended on MinimalForwarder. The breakdown occurred at the root, MinimalForwarder, where forged signatures and absent data validation enabled unrestricted access.
With full control of the price oracle, the attacker manipulated ETH prices at will. By first setting ETH as low as $100, opening highly leveraged long positions, then inflating prices to $10,000, they executed a rinse-and-repeat strategy to drain funds. The Base chain alone lost $3.12 million.
While Pyth Network served as the underlying oracle provider, the breach was entirely due to KiloEx’s insecure implementation. The attacker exploited this weakness without leaving substantial traces, showcasing how insecure architecture can become a gateway for massive theft.
Tracing the Attack:
The attacker behind the KiloEx exploit demonstrated a high level of coordination and preparation, beginning with the use of Tornado Cash, a well-known crypto mixer, to fund their activities.
The wallet first appeared on April 13, one day before the exploit, indicating premeditation. The originating wallet was:
0xa0fa4ab8ded0c07085d244e1981919b440f78b609e1cf8d7f8ee32d358dfdf46
From there, the attacker launched synchronized attacks across Base, BNB Chain, Taiko, opBNB, and Manta, exploiting the same vulnerability on each network. The precise timing and execution reflect deliberate targeting.
All exploits were linked to the following Ethereum address:
0x00fac92881556a90fdb19eae9f23640b95b4bcbd
Attack Details:
Base Chain:
Transaction 1 ($3.13M): 0x6b378c84aa57097fb5845f285476e33d6832b8090d36d02fe0e1aed909228edd
Transaction 2 ($187k): 0xde7f5e78ea63cbdcd199f4b109db2a551b4462dec79e4dba37711f6c814b26e6
Transaction 3 ($11k): 0xf0fcce0807a82041d050a60461e187f0e81a6f7fbda69bb600c04049d924e138
BNB Chain:
Transaction 1 ($893k): 0x1aaf5d1dc3cd07feb5530fbd6aa09d48b02cbd232f78a40c6ce8e12c55927d03
Transaction 2 ($10k): 0x38b25be14b83fd549d5e0b29ba962db83d41f5f9072d0eac4f692fa8e7110bc0
opBNB:
Transaction 1 ($2.9M): 0x79eb28ae21698733048e2dae9f9fe3d913396dc9d93a0e30d659df6065127964
Transaction 2 ($205.5k): 0xcfc679a66f1d2966dbe83bb827409c40f29f881c20128107ae73e93ab55c65e4
Transaction 3 ($14k): 0x783d56ce53af6d59c7c4be374ff48a66257733fadf5905526b5862a54917889f
Taiko:
Transaction ($41k): 0x9bce6e105cea138fe9fb1e4bfb63fe90d21817db9d2cc6d1bf7697317430215b
Manta:
Transaction ($100k): 0x06074831103a1e91c7b6dcb3b641cf4b79bfa208ea75e99cf9b5100d60a82df5
The attacker also used a separate Ethereum address to bridge funds:
0x551f3110f12c763D1611d5A63B5F015d1c1a954C
In total, the amount stolen is estimated at approximately $7,491,500.
By the time SlowMist’s MistTrack flagged the attacker’s addresses, the stolen funds were already being moved across various blockchain bridges, including zkBridge, deBridge, and Meson.
These once-promising cross-chain protocols, intended to enhance DeFi's borderless potential, now served as ideal avenues for the attacker to launder the stolen funds.
In response, KiloEx quickly urged "all partner protocols and platforms to blacklist this address" while working with security partners to track the flow of the stolen assets. This is becoming a common response in the DeFi space, where security breaches have become an unfortunately predictable pattern.
In such a severe security violation, what more can a platform do beyond sending a strongly worded request to the blockchain?
Consequences:
KiloEx’s response to the attack came swiftly, but it followed the familiar steps seen in many DeFi hacks: suspend trading, blacklist addresses, and trace the stolen funds. This reaction, while necessary, was akin to locking the door after the burglars had already made off with the loot.
The following day, the platform announced that the vulnerability had been identified and would be fixed soon, a revelation that seemed more like a formality than a breakthrough, after all, the damage had already been done.
The vulnerability in the contract has been identified and is expected to be fixed soon.
— KiloEx (@KiloEx_perp)
1:11 PM • Apr 15, 2025
It was like discovering the front door was broken after the valuables were taken.
The platform then made its offer to the hacker: return 90% of the $7.5 million, keep 10% as a "whitehat bounty," and KiloEx would even send out a tweet acknowledging the cooperation. The message, however, felt more like a desperate plea than a genuine negotiation.
Their statement, dripping with an air of desperation masked as strength, read: "Our investigation, supported by law enforcement, cybersecurity agencies, and multiple exchanges & bridge protocols, has uncovered critical information about your activities."
KiloEx’s plea to the attacker could be summarized simply: return the funds. However, the attacker has remained silent, with their wallets still untouched and holding the full $7.5 million in stolen assets.
In response, KiloEx has filed a police report in Hong Kong and stated they are cooperating with the Criminal Division, Cybercrime Unit, and cybersecurity firm SlowMist. The platform is freezing positions based on pre-attack snapshots and has promised user compensation plans, while also attempting direct on-chain communication with the attacker.
Curiously, KiloEx took the opportunity to address “rumors suggesting KiloEx may have been involved in the hack,” despite the fact that such suspicions were not prominent until the platform brought them up. This move has raised questions about whether they unintentionally invited speculation about an insider threat.
KiloEx confirmed that they had undergone five audits since June 2023. However, these assessments failed to prevent the exploit.
The most recent audit, conducted by ScaleBit in March 2025, offered a response that sidestepped responsibility. The firm stated they were “deeply saddened” by the incident but noted that “the root cause falls outside the scope of our audit.”
This raises critical concerns about audit standards. If a security audit does not account for vulnerabilities in something as fundamental as Oracle access control, what exactly is its purpose?
KiloEx now joins the long list of protocols brought down by oracle manipulation, a classic vulnerability that continues to exploit the DeFi space's weakest links.
Despite deploying on Base, BNB Chain, Taiko, and opBNB, KiloEx left its MinimalForwarder completely exposed, giving attackers direct access to $7.5 million in user funds. This was not a sophisticated hack, just a basic failure in access control that could have been prevented.
The team prioritized expansion over security, and it showed. Five audits since June 2023 failed to catch the flaw that ultimately drained the protocol. The result was a sprawling multi-chain rollout built on a compromised foundation.
Users are not interested in retroactive fixes or apologetic audit statements. They care about protocols that take security seriously from day one. When your MinimalForwarder becomes the doorway to a full treasury drain, no amount of post-mortem analysis or PR cleanup will restore trust.
Thank you for reading our latest Crypto Hack story.
Like, Subscribe and Share for more crypto hack content below.