Wasabi Protocol lost $5.5M after an admin key was compromised. Here’s how one wallet drained millions across four chains in minutes. Wasabi Protocol suffered aWasabi Protocol lost $5.5M after an admin key was compromised. Here’s how one wallet drained millions across four chains in minutes. Wasabi Protocol suffered a

Wasabi Protocol Hack: Over $5 M Lost to Admin Key Breach

2026/04/30 20:53
3 min read
For feedback or concerns regarding this content, please contact us at [email protected]

Wasabi Protocol lost $5.5M after an admin key was compromised. Here’s how one wallet drained millions across four chains in minutes.

Wasabi Protocol suffered a major security breach on April 30, 2025. 

Wasabi Protocol Hack: Over $5 M Lost to Admin Key Breach

An attacker compromised a privileged deployer wallet, draining over $5.5 million across four blockchain networks. The affected chains included Ethereum, Base, Berachain, and Blast. 

Security firms Blockaid, CertiK, and PeckShield all flagged the incident within hours. Wasabi confirmed the issue by 10:30 a.m. UTC, urging users to stop interacting with its contracts immediately.

Read also: 

How the Wasabi Protocol Admin Key Exploit Unfolded

The attack did not involve a smart contract bug. Instead, the attacker gained control of wasabideployer.eth, Wasabi’s sole admin key holder.

According to Blockaid, the deployer wallet granted ADMIN_ROLE to a malicious helper contract. That contract then upgraded multiple perpetual futures vaults and a LongPool, pulling funds directly from them. 

Blockaid reported that around $2.2 million left Ethereum, including 841 wrapped ETH, USDC, and several memecoins. Another $2.4 million moved from Base.

PeckShield put the total losses above $5 million across all chains. Security researcher Jeremy also noted $5.5 million stolen, citing WETH, PEPE, Mog, and USDC vaults as targets. The funds landed across multiple attacker-controlled addresses.

Compromised LP Tokens and Vault Contracts Across Chains

Blockaid warned that all Wasabi and Spicy LP-share tokens tied to the breached vaults should be treated as compromised. The underlying assets backing those tokens had been drained or were at risk. 

Blockaid advised platforms to flag these tokens in their interfaces and prompt users with active approvals to revoke access immediately.

Nine vault contracts on Ethereum were listed as compromised. These included the wWETH, sUSDC, sREKT, wPEPE, wMog, wBITCOIN, sZYN vaults, and the LongPool. 

Eight contracts on Base were also affected, covering sUSDC, wWETH, sBTC/cbBTC, sVIRTUAL, sAERO, sBRETT, sWELL, and sSKI vaults.

Berachain’s foundation confirmed awareness of the breach. It paused and blacklisted affected Wasabi reward vaults on its network and stopped further BGT emissions to the compromised contracts. 

Berachain advised users who interacted with Wasabi on its chain to revoke token approvals through revoke.cash.

Single EOA, No Multisig: Security Experts Raise Concerns

The root cause, as Blockaid identified it, was a single externally owned account holding full ADMIN_ROLE in Wasabi’s PerpManager. 

There was no multisig, no timelock, and no DAO governance protecting that access. SlowMist founder Cos pointed out that once that private key leaked, nothing stood between the attacker and the vaults.

On-chain investigator ZachXBT raised questions about why one wallet carried so much control without basic safeguards in place. Besides, analyst Ted Pillows noted that the incident highlighted the dangers of privileged access paired with upgradeable contracts.

Berachain confirmed it was working with Blockaid and ZeroShadow on the ongoing investigation. This story is still developing, and further details are expected as the investigation continues.

The post Wasabi Protocol Hack: Over $5 M Lost to Admin Key Breach appeared first on Live Bitcoin News.

Market Opportunity
MemeCore Logo
MemeCore Price(M)
$3.2765
$3.2765$3.2765
+1.04%
USD
MemeCore (M) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.