Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million

Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million

BlockBeatsBlockBeats2025/09/24 07:46
Show original
By:BlockBeats

The attacker carried out a series of operations, including calling the execTransaction function of the Gnosis Safe Proxy contract and the MultiSend contract, gradually removing other owners, ultimately taking over the contract and maliciously minting UXLINK tokens.

Original Title: "Technical Analysis of UXLINK Theft of Approximately $11.3 Million"
Original Source: ExVul Security


Event Description


On September 23, the private key of UXLINK project's multi-signature wallet was leaked, resulting in the theft of approximately $11.3 million worth of cryptocurrency assets, which have since been dispersed and transferred to multiple centralized (CEX) and decentralized (DEX) exchanges. Immediately after the attack, we worked with UXLINK to investigate and analyze the incident and monitored the flow of funds. UXLINK urgently contacted major exchanges to request the freezing of suspicious funds and has reported the case to the police and relevant authorities to seek legal support and asset recovery. Most of the hacker's assets have been marked and frozen by major exchanges, thereby minimizing further risks to the community. The project team has promised to maintain transparency with the community, and ExVul will continue to analyze and follow up on the progress of the incident.


Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 0

()


Latest Developments


During the flow of hacker funds, assets transferred into exchanges have been frozen. Preliminary on-chain tracking revealed that the hacker who previously stole UXLINK assets appears to have fallen victim to an Inferno Drainer phishing attack. Upon verification, approximately 542 million $UXLINK tokens illegally obtained by the hacker have been stolen through an "authorization phishing" technique.





Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 1


Attack Analysis


1. Previously, due to malicious operations or private key leakage by a multi-signature Owner, a malicious address was added as a multi-signature account, and the contract's signature threshold was reset to 1, meaning only a single account signature was required to execute contract operations. The hacker set a new Owner address as 0x2EF43c1D0c88C071d242B6c2D0430e1751607B87.

Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 2

()


2. The attacker first called the execTransaction function in the Gnosis Safe Proxy contract. This function became the entry point for maliciously removing multi-signature members, and all subsequent malicious operations were executed internally within this transaction.

Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 3

()


3. When calling execTransaction, the attacker specified a malicious operation in its data parameter: invoking the Safe: Multi Send Call Only 1.3.0 implementation contract via delegatecall.

Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 4


Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 5

()


4. In the multiSend function of Safe: Multi Send Call Only 1.3.0, the execution flow is redirected to the removeOwner function of the Gnosis Safe Proxy contract. Specifically, the attacker first invoked the MultiSend implementation contract via delegatecall executed on the proxy contract, causing it to run multiSend in the context of the proxy contract; then, multiSend, according to parameters constructed by the attacker, calls back the Gnosis Safe Proxy contract itself via call and triggers the removeOwner function, thereby removing the existing Owner address.

Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 6


Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 7


Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 8

()


5. The core of a successful call lies in satisfying the condition msg.sender == address(this). In the removeOwner function, to prevent direct external calls, the contract sets up authorized verification, whose internal logic usually requires the caller to be the contract itself (msg.sender == address(this)). Therefore, only when the contract's internal process calls itself can removeOwner be successfully executed.

Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 9


Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 10


6. The hacker used the above method to remove other Owners in the multi-signature one by one, breaking the multi-signature mechanism and ultimately taking over the contract.

Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 11


7. At this point, the attacker repeatedly executed the above steps, causing the original multi-signature security mechanism to completely fail. Now, a single malicious Owner's signature alone could pass multi-signature verification, thus achieving full control over the contract.

Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 12

()


Summary


Due to malicious operations or private key leakage by a multi-signature Owner, the attacker added a malicious address as a multi-signature member and set the signature threshold of the Gnosis Safe Proxy to 1, causing the original multi-signature security design to completely fail. After that, a single malicious Owner could pass multi-signature verification. The attacker then gradually removed other Owners from the contract, ultimately achieving full control over the contract and further transferring contract assets, as well as maliciously minting $UXLINK tokens on-chain.


This attack highlights the critical role of multi-signature management in blockchain security. Although the project adopted the Safe multi-signature mechanism and configured multiple multi-signature accounts, flaws in management ultimately rendered the multi-signature design ineffective. The ExVul team recommends that project teams strive for decentralization in multi-signature management, such as having different members separately hold private keys and adopting diversified private key storage methods, to ensure that the multi-signature mechanism truly provides the intended security protection.


Appendix


The following are suspected hacker addresses tracked on-chain by the ExVul team:


Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 13


Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 14


Technical Analysis of UXLINK Theft Involving Approximately $11.3 Million image 15


0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

Pyth announces the launch of Pyth Pro: Reshaping the market data supply chain

Pyth Pro aims to provide institutions with a transparent and comprehensive data perspective, covering all asset classes and geographic regions in global markets, eliminating inefficiencies, blind spots, and rising costs in the traditional market data supply chain.

深潮2025/09/24 13:36
Pyth announces the launch of Pyth Pro: Reshaping the market data supply chain

Stablecoins + Quality Tokens + New Perpetual DEX: An Investment Portfolio Sharing from a Humble Airdrop Hunter

How to build an all-weather cryptocurrency investment portfolio in both bull and bear markets?

深潮2025/09/24 13:36

Boom, Bust, and Escape: The Disillusionment of Traditional VCs in Web3

Crypto is never about belief; it's merely a footnote to the cycle.

深潮2025/09/24 13:35
Boom, Bust, and Escape: The Disillusionment of Traditional VCs in Web3

Delphi Digital Research Report: Plasma, Targeting Trillion-Dollar Market Opportunities

A zero-fee stablecoin public chain targets the trillion-dollar settlement market.

深潮2025/09/24 13:35
Delphi Digital Research Report: Plasma, Targeting Trillion-Dollar Market Opportunities