April 9 (Cointime) - PeckShield has reported that the exploited RouteProcess02 contract has been deployed in multiple chains. To protect their funds, SushiSwap users are urged to immediately revoke permissions from the following addresses:
- ETH: 0x044b7..7357
- BSC: 0xd75f...6550
- POLYGON: 0x5097...649a
- AVAX: 0xbace...9c4f
- FTM: 0x3e60...c715
It seems the exploited RouteProcess02 contract has been deployed in multiple chains. @SushiSwap
— PeckShield Inc. (@peckshield) April 9, 2023
Please *REVOKE* the following addresses ASAP.
ETH: 0x044b7..7357
BSC: 0xd75f...6550
POLYGON: 0x5097...649a
AVAX: 0xbace...9c4f
FTM: 0x3e60...c715 https://t.co/nWcI9oydW6 pic.twitter.com/1RVj2TP5C2
Earlier today, Cointime has reported that PeckShield identified a bug in the SushiSwap RouterProcess2 contract, which has caused a loss of over $3.3 million (around 1900 ETH) for Frog Nation's former CFO 0xSifu.
This is a developing story and we will keep you updated as more information becomes available.
All Comments