Wasabi Hack: AI or Flawed Admin Key?

Verily, the Wasabi Protocol found itself ensnared in a most grievous breach of its administrative keys, through which the malevolent forces of digital darkness siphoned over five million dollars from its perpetuals vaults and LongPool across the realms of Ethereum, Base, Berachain, and Blast, as chronicled by the on-chain scribes of Blockaid and PeckShield.

Lo, the attacker, cunning as a fox in a henhouse, secured the ADMIN_ROLE through the protocol’s deployer wallet, then transformed the vaults into instruments of ruin, leeching the funds of the unwitting. A sum of four million five hundred fifty thousand dollars had been pilfered, and the investigation, like a weary traveler, pressed onward.

The Single-Key Catastrophe

Blockaid, with the precision of a surgeon, traced the calamity to wasabideployer.eth, the sole entity bearing the ADMIN_ROLE in Wasabi’s PerpManager AccessManager. A single key, a single vulnerability, a tale as old as time.

The attacker, swift as a shadow, called grantRole upon the deployer EOA with no delay, thereby converting their orchestrator contract into a gilded cage of power. A most unwise decision, one might say.

“We are aware of this grievous matter and are diligently investigating. As a precaution, we implore you, dear users, to refrain from interacting with Wasabi contracts until further notice,” implored Wasabi Protocol, its voice trembling with the weight of responsibility.

From that moment, the attacker UUPS-upgraded the perpetual vaults and LongPool into malevolent contraptions, draining the coffers of the faithful. The deployer key, still active, now casts a long shadow over the compromised Spicy LP-share tokens, whose value dwindles like a fading star.

Blockaid, ever the vigilant sentinel, noted the same perpetrator, orchestrator, and strategy bytecode, linking this incident to prior misdeeds targeting Wasabi. A pattern as persistent as the tides, echoing the folly of single-EOA admin setups devoid of timelocks or multisigs. PeckShield, with its ledger of losses, declared the total past the five-million mark across all four chains.

#PeckShieldAlert @wasabi_protocol has been exploited for $5M+ across multiple chains, including Ethereum, Base, Berachain, & Blast.

– PeckShieldAlert (@PeckShieldAlert) April 30, 2026

The AI-Hacker Theory: A New Dawn?

Meanwhile, the incident arrived mere hours after three other attacks, each more absurd than the last. BeInCrypto, that chronicler of chaos, reported the Tuesday cascade, which comprised:

  • The Sweat Economy’s $3.46 million drain, later revealed to be a foundation rescue, not a hack. A tale of redemption, if you will.
  • Syndicate Commons bridge on Base, which lost 18.5 million SYND tokens, worth a mere $330,000 to $400,000. The proceeds, like a ghost, were bridged to Ethereum.
  • Aftermath Finance, which paused its perpetuals protocol after losing roughly $1.14 million USDC. A tragedy of epic proportions, or so they say.

“It’s not about the type, it’s about the quantity – what is it now, 7 hacks in the last 5 days?”

– Vitto Rivabella (@VittoStack) April 30, 2026

In this age of digital tumult, analysts ponder the role of AI, musing on the asymmetry between attacker tooling and protocol defenses. A most perplexing conundrum, akin to a chess game where one side has a king and the other a queen, yet the queen moves first.

“People are asking – Is AI the end of crypto?”

– James Seyffart (@JSeyff) April 29, 2026

In the same vein, developer Vitto Rivabella proposed a theory so outlandish it could have been plucked from the pages of a Tolstoy novel: that North Korea trained an in-house AI on years of stolen DeFi data, now operating as an autonomous exploiter, draining protocols faster than human reviewers can patch them. A tale as fantastical as a fairy story, yet not entirely implausible.

“Wild conspiracy theory about the recent DeFi hacks: North Korea has trained its own, state-funded version of Mythos using the insane amounts of data obtained by hacking DeFi protocols over the last 10 years. Now they’re just letting their AI DeFi hacker run free and won’t stop cashing in until someone stops them,” wrote Rivabella, his imagination as boundless as the steppes of Russia.

Whether AI be the architect of these exploits or not, the single-key admin roles remain a most glaring vulnerability, a chink in the armor of even the most robust protocols. A lesson, perhaps, in the perils of overreliance on a single, fragile thread.

Read More

2026-04-30 14:33