GoPlus: Suspected "project management address hacked" led to Ribbon Finance being attacked

robot
Abstract generation in progress

Deep Tide TechFlow News, December 15th, the GoPlus Chinese community posted on social media analyzing the principles behind the attack on the decentralized options protocol Ribbon Finance.

The attacker upgraded the price oracle contract at address 0x657CDE to a malicious implementation contract, then set the expiration times for four tokens—stETH, Aave, PAXG, and LINK—to December 12, 2025, 16:00:00 (UTC+8) and tampered with the expiration prices to profit from the attack.

It is worth noting that when the project contract was created, the _transferOwnership status of the attacker’s address was already set to true, allowing it to pass the contract security checks. Analysis shows that this attacker’s address was likely one of the project’s management addresses initially, but was later controlled by hackers through social engineering attacks and other means to carry out this attack.

STETH3.65%
AAVE1.19%
PAXG0.7%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)