Back to Blog

我们对Wintermute项目所受指控的简要分析

Code Auditing
September 27, 2022

在调查了James Edwards (@libreshash)发布的名为Wintermute黑客攻击分析:内部作案的报告后,我们认为Wintermute项目被指控的说法并非如作者声称的那样确凿。

0x1. 账户0x0000000fe6a514a32abdcdfcc076c85243de899b的权限

报告只是查找了映射变量**_setCommonAdmin**中账户的当前状态,但这并不合理,因为该项目在知晓攻击后可能会采取行动撤销管理员权限。

_setCommonAdmin[0x0000000fe6a514a32abdcdfcc076c85243de899b] 的存储槽位键为 0x1488acaeec0884899a8f09209808003200bbe32c28e8f074961d28a1dc78daa1,我们已对此进行历史存储变更调查。 结果显示,在以下两个交易中,该值已被修改了两次:

  • 0x37ab1d41fe3fa405b993c72ad9812d2074d55639f31ead8db2668993f3028f2a (区块 15007314);
  • 0x3456571463b98eb253bfd894f06ed706073942a89fb21c42fc12ea56c190b528 (区块 15575003)。

第一次修改只是将值从0更改为1;第二次将值从1更改为0,如下所示: image

请注意,报告中分析的攻击发生在区块 15572515 (0xd2ff7c138d7a4acb78ae613a56465c90703ab839f3c8289c5c0e0d90a8b4ce16),即第一次和第二次修改之间

显然,第二次修改值意味着该项目刚刚撤销了该账户的管理员权限。

0x2. 可疑活动

报告认为以下活动可疑:

然而,这并不像它声称的那样有说服力。攻击者可以通过监控转账交易活动来实现目标。从技术角度来看,这并不奇怪。例如,存在一些链上MEV机器人持续监控交易以获取利润。

0x3. 结论

总而言之,这份报告不足以令人信服地指控Wintermute项目。

关于BlockSec

BlockSec 是一家开创性的区块链安全公司,成立于 2021 年,由一群全球杰出的安全专家创立。公司致力于增强新兴 Web3 世界的安全性和可用性,以促进其大规模采用。为此,BlockSec 提供智能合约和 EVM 链安全审计服务、用于安全开发和主动阻止威胁的 Phalcon 平台、用于资金追踪和调查的 MetaSleuth 平台,以及用于 Web3 构建者在加密世界高效冲浪的 MetaDock 扩展。

迄今为止,公司已为 MetaMask、Uniswap Foundation、Compound、Forta 和 PancakeSwap 等 300 多家知名客户提供服务,并在两轮融资中从 Matrix Partners、Vitalbridge Capital 和 Fenbushi Capital 等领先投资者那里获得了数千万美元的资金。

官方网站:https://blocksec.com/ 官方推特账号:https://twitter.com/BlockSecTeam

Sign up for the latest updates
Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation
Security Insights

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

On April 1, 2026 (UTC), Drift Protocol on Solana suffered a $285.3M loss after an attacker exploited Solana's durable nonce mechanism to delay the execution of phished multisig approvals, ultimately transferring administrative control of the protocol's 2-of-5 Squads governance with zero timelock. With full admin privileges, the attacker created a malicious collateral market (CVT), inflated its oracle price, relaxed withdrawal protections, and drained USDC, JLP, SOL, cbBTC, and other assets through 31 rapid withdrawals in approximately 12 minutes. This incident highlights how durable nonce-based delayed execution can decouple signer intent from on-chain execution, bypassing the temporal assumptions that multisig security implicitly relies on.

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 23 and March 29, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.53M. Incidents include a $679K flawed burn mechanism exploit on the BCE token, a $512K spot-price manipulation attack on Cyrus Finance's PancakeSwap V3 liquidity withdrawal, a $133.5K flash-loan-driven referral reward manipulation on a TUR staking contract, and multiple integer overflow, reentrancy, and accounting error vulnerabilities in DeFi protocols. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Newsletter -  March 2026
Security Insights

Newsletter - March 2026

In March 2026, the DeFi ecosystem experienced three major security incidents. Resolv Protocol lost ~$80M due to compromised privileged infrastructure keys, BitcoinReserveOffering suffered ~$2.7M from a double-minting logic flaw, and Venus Protocol incurred ~$2.15M following a donation attack combined with market manipulation.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit