Back to Blog

我们对Wintermute项目所受指控的简要分析

Code Auditing
September 27, 2022

在调查了James Edwards (@libreshash)发布的名为Wintermute黑客攻击分析:内部作案的报告后,我们认为Wintermute项目被指控的说法并非如作者声称的那样确凿。

0x1. 账户0x0000000fe6a514a32abdcdfcc076c85243de899b的权限

报告只是查找了映射变量**_setCommonAdmin**中账户的当前状态,但这并不合理,因为该项目在知晓攻击后可能会采取行动撤销管理员权限。

_setCommonAdmin[0x0000000fe6a514a32abdcdfcc076c85243de899b] 的存储槽位键为 0x1488acaeec0884899a8f09209808003200bbe32c28e8f074961d28a1dc78daa1,我们已对此进行历史存储变更调查。 结果显示,在以下两个交易中,该值已被修改了两次:

  • 0x37ab1d41fe3fa405b993c72ad9812d2074d55639f31ead8db2668993f3028f2a (区块 15007314);
  • 0x3456571463b98eb253bfd894f06ed706073942a89fb21c42fc12ea56c190b528 (区块 15575003)。

第一次修改只是将值从0更改为1;第二次将值从1更改为0,如下所示: image

请注意,报告中分析的攻击发生在区块 15572515 (0xd2ff7c138d7a4acb78ae613a56465c90703ab839f3c8289c5c0e0d90a8b4ce16),即第一次和第二次修改之间

显然,第二次修改值意味着该项目刚刚撤销了该账户的管理员权限。

0x2. 可疑活动

报告认为以下活动可疑:

然而,这并不像它声称的那样有说服力。攻击者可以通过监控转账交易活动来实现目标。从技术角度来看,这并不奇怪。例如,存在一些链上MEV机器人持续监控交易以获取利润。

0x3. 结论

总而言之,这份报告不足以令人信服地指控Wintermute项目。

关于BlockSec

BlockSec 是一家开创性的区块链安全公司,成立于 2021 年,由一群全球杰出的安全专家创立。公司致力于增强新兴 Web3 世界的安全性和可用性,以促进其大规模采用。为此,BlockSec 提供智能合约和 EVM 链安全审计服务、用于安全开发和主动阻止威胁的 Phalcon 平台、用于资金追踪和调查的 MetaSleuth 平台,以及用于 Web3 构建者在加密世界高效冲浪的 MetaDock 扩展。

迄今为止,公司已为 MetaMask、Uniswap Foundation、Compound、Forta 和 PancakeSwap 等 300 多家知名客户提供服务,并在两轮融资中从 Matrix Partners、Vitalbridge Capital 和 Fenbushi Capital 等领先投资者那里获得了数千万美元的资金。

官方网站:https://blocksec.com/ 官方推特账号:https://twitter.com/BlockSecTeam

Sign up for the latest updates
Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield
Security Insights

Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield

Looking ahead, targeted freezing events like this $6.76M USDT action will only become more common. On-chain data analysis is improving. Stablecoin issuers are also working closely with regulators. As a result, hidden illicit financial networks will be exposed.

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026

During the week of March 2 to March 8, 2026, seven blockchain security incidents were reported with total losses of ~$3.25M. The incidents occurred across Base, BNB Chain, and Ethereum, exposing critical vulnerabilities in smart contract business logic, token deflationary mechanics, and asset price manipulation. The primary causes included a double-minting logic flaw during full token deposits that allowed an attacker to exponentially inflate their balances through repeated burn-and-mint cycles, a price manipulation vulnerability in an AMM-based lending market where artificially inflated vault shares created divergent price anchors to incorrectly force healthy positions into liquidation, and a flawed access control implementation relying on trivially spoofed contract interfaces that enabled attackers to bypass authorization to batch-mint and dump arbitrary tokens.

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026

During the week of February 23 to March 1, 2026, seven blockchain security incidents were reported with total losses of ~$13M. The incidents affected multiple protocols, exposing critical weaknesses in oracle design/configuration, cryptographic verification, and core business logic. The primary drivers included oracle manipulation/misconfiguration that led to the largest loss at YieldBloxDAO (~$10M), a crypto-proof verification flaw that enabled the FOOMCASH (~$2.26M) exploit, and additional token design and logic errors impacting Ploutos, LAXO, STO, HedgePay, and an unknown contract, underscoring the need for rigorous audits and continuous monitoring across all protocol layers.