Yesterday, a security incident was reported. The computing verification platform Truebit Protocol was hacked due to a smart contract vulnerability, resulting in the theft of 8,535 ETH, with a total market value of approximately $26.36 million.
What’s even more heartbreaking is the hacker’s incredibly fast response. In less than a day, just four hours before this morning, the stolen ETH was already moved through the mixing tool Tornado on-chain, making it difficult to trace the funds’ destination.
This incident once again exposes the fragility of smart contract security. Although the transparency of blockchain allows all transactions to be tracked, the existence of mixing protocols like Tornado enables large illegal funds to achieve "covert transfer" to some extent. From theft to laundering, the entire process takes only a few hours—posing a severe challenge to the security of the entire Ethereum ecosystem.
Industry insiders remind that project teams need to strengthen code audits, and users should also enhance their risk awareness.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Yesterday, a security incident was reported. The computing verification platform Truebit Protocol was hacked due to a smart contract vulnerability, resulting in the theft of 8,535 ETH, with a total market value of approximately $26.36 million.
What’s even more heartbreaking is the hacker’s incredibly fast response. In less than a day, just four hours before this morning, the stolen ETH was already moved through the mixing tool Tornado on-chain, making it difficult to trace the funds’ destination.
This incident once again exposes the fragility of smart contract security. Although the transparency of blockchain allows all transactions to be tracked, the existence of mixing protocols like Tornado enables large illegal funds to achieve "covert transfer" to some extent. From theft to laundering, the entire process takes only a few hours—posing a severe challenge to the security of the entire Ethereum ecosystem.
Industry insiders remind that project teams need to strengthen code audits, and users should also enhance their risk awareness.