Blockchain security firms SlowMist and PeckShield said on 4 August that decentralised-finance lender CrediX was drained after a hacker gained broad administrative privileges through the project’s multisignature wallet. A transaction executed six days earlier quietly added the attacker’s address as both an admin and a bridge operator, giving the account authority to mint collateral and move funds out of the protocol. On Thursday the attacker used the elevated “BRIDGE” role to borrow or withdraw the remaining assets from CrediX’s liquidity pools, according to on-chain data cited by PeckShield. The platform disabled its website and halted new deposits while investigators assess the damage. CrediX has not released an official loss estimate, but industry analysts warn that the exploit could threaten a US$60 million credit facility the Singapore-based project secured in 2023. Security teams are tracking the attacker’s addresses and advising users to revoke any outstanding approvals linked to the protocol.
CREDIX DRAINED AFTER MULTISIG EXPLOIT, WEBSITE DISABLED DeFi platform CrediX was exploited after an attacker was added as a multisig admin and bridge controller, allowing them to mint collateral and drain liquidity. CrediX, which once secured a $60M credit line in 2023, has https://t.co/XO3RjvoIxb https://t.co/yMBJI7XSOW
[SLOWMIST] CrediX Exploited via Multisig Admin Backdoor, Attacker Mints Collateral and Drains Pool After Gaining Control, Website Taken Offline, $60M Credit Line at Risk
Today's @CrediX_fi hack is due to compromised admin account 0xF321683831Be16eeD74dfA58b02a37483cEC662e, which has a number of roles, including POOL_ADMIN, BRIDGE, ASSET_LISTING_ADMIN, EMERGENCY_ADMIN, and RISK_ADMIN. And the BRIDGE role is abused to drain/borrow pool assets https://t.co/0jmAuvtcJv https://t.co/JGuLmh8zWu