我们对Wintermute项目所受指控的简要分析

我们对Wintermute项目所受指控的简要分析

在调查了James Edwards (@libreshash)发布的名为Wintermute黑客攻击分析:内部作案的报告后,我们认为Wintermute项目被指控的说法并非如作者声称的那样确凿。

0x1. 账户0x0000000fe6a514a32abdcdfcc076c85243de899b的权限

报告只是查找了映射变量**_setCommonAdmin**中账户的当前状态,但这并不合理,因为该项目在知晓攻击后可能会采取行动撤销管理员权限。

_setCommonAdmin[0x0000000fe6a514a32abdcdfcc076c85243de899b] 的存储槽位键为 0x1488acaeec0884899a8f09209808003200bbe32c28e8f074961d28a1dc78daa1,我们已对此进行历史存储变更调查。 结果显示,在以下两个交易中,该值已被修改了两次:

  • 0x37ab1d41fe3fa405b993c72ad9812d2074d55639f31ead8db2668993f3028f2a (区块 15007314);
  • 0x3456571463b98eb253bfd894f06ed706073942a89fb21c42fc12ea56c190b528 (区块 15575003)。

第一次修改只是将值从0更改为1;第二次将值从1更改为0,如下所示: image

请注意,报告中分析的攻击发生在区块 15572515 (0xd2ff7c138d7a4acb78ae613a56465c90703ab839f3c8289c5c0e0d90a8b4ce16),即第一次和第二次修改之间

显然,第二次修改值意味着该项目刚刚撤销了该账户的管理员权限。

0x2. 可疑活动

报告认为以下活动可疑:

然而,这并不像它声称的那样有说服力。攻击者可以通过监控转账交易活动来实现目标。从技术角度来看,这并不奇怪。例如,存在一些链上MEV机器人持续监控交易以获取利润。

0x3. 结论

总而言之,这份报告不足以令人信服地指控Wintermute项目。

关于BlockSec

BlockSec 是一家开创性的区块链安全公司,成立于 2021 年,由一群全球杰出的安全专家创立。公司致力于增强新兴 Web3 世界的安全性和可用性,以促进其大规模采用。为此,BlockSec 提供智能合约和 EVM 链安全审计服务、用于安全开发和主动阻止威胁的 Phalcon 平台、用于资金追踪和调查的 MetaSleuth 平台,以及用于 Web3 构建者在加密世界高效冲浪的 MetaDock 扩展。

迄今为止,公司已为 MetaMask、Uniswap Foundation、Compound、Forta 和 PancakeSwap 等 300 多家知名客户提供服务,并在两轮融资中从 Matrix Partners、Vitalbridge Capital 和 Fenbushi Capital 等领先投资者那里获得了数千万美元的资金。

官方网站:https://blocksec.com/ 官方推特账号:https://twitter.com/BlockSecTeam

Sign up for the latest updates
Weekly Web3 Security Incident Roundup | Feb 9 – Feb 15, 2026

Weekly Web3 Security Incident Roundup | Feb 9 – Feb 15, 2026

During the week of February 9 to February 15, 2026, three blockchain security incidents were reported with total losses of ~$657K. All incidents occurred on the BNB Smart Chain and involved flawed business logic in DeFi token contracts. The primary causes included an unchecked balance withdrawal from an intermediary contract that allowed donation-based inflation of a liquidity addition targeted by a sandwich attack, a post-swap deflationary clawback that returned sold tokens to the caller while draining pool reserves to create a repeatable price-manipulation primitive, and a token transfer override that burned tokens directly from a Uniswap V2 pair's balance and force-synced reserves within the same transaction to artificially inflate the token price.

Top 10 "Awesome" Security Incidents in 2025

Top 10 "Awesome" Security Incidents in 2025

To help the community learn from what happened, BlockSec selected ten incidents that stood out most this year. These cases were chosen not only for the scale of loss, but also for the distinct techniques involved, the unexpected twists in execution, and the new or underexplored attack surfaces they revealed.

#10 Panoptic Incident: XOR Linearity Breaks the Position Fingerprint Scheme

#10 Panoptic Incident: XOR Linearity Breaks the Position Fingerprint Scheme

On August 29, 2025, Panoptic disclosed a Cantina bounty finding and confirmed that, with support from Cantina and Seal911, it executed a rescue operation on August 25 to secure roughly $400K in funds. The issue stemmed from a flaw in Panoptic’s position fingerprint calculation algorithm, which could have enabled incorrect position identification and downstream fund risk.