The wallet that deployed the DAI smart contract is compromised on all L2 networks except Arbitrum and Optimism. This was noticed by information security researcher Christopher Mooney.
According to the expert, the DAI address was originally generated using the Profanity Vanity Address tool, which later turned out to be vulnerable.
"The source address was created using a large GPU cluster, so we knew it would take some time for an attacker to find the private key. We left a 1 ETH bait at the address and confirmed the exploit in July", Mooney wrote.
He stressed that the funds of DAI holders on Optimism and Arbitrum are safe, but this is not the case for other networks. The expert has already found malicious contracts placed by the attacker in the Base and Polygon blockchains.
He called for all instances of the compromised smart contract to be marked after 2023 as phishing.
DAI Security PSA for wallet providers, block explorers, and users. The L2 DAI deployer (0x075da589886BA445d7c7e81c472059dE7AE65250) for the DAI vanity address (0xDA10009cBd5D07dd0CeCc66161FC93D7c9000da1) has been compromised. (1/7)
— Christopher Mooney (@godsflaw) September 3, 2024
According to the expert, the DAI address was originally generated using the Profanity Vanity Address tool, which later turned out to be vulnerable.
"The source address was created using a large GPU cluster, so we knew it would take some time for an attacker to find the private key. We left a 1 ETH bait at the address and confirmed the exploit in July", Mooney wrote.
He stressed that the funds of DAI holders on Optimism and Arbitrum are safe, but this is not the case for other networks. The expert has already found malicious contracts placed by the attacker in the Base and Polygon blockchains.
He called for all instances of the compromised smart contract to be marked after 2023 as phishing.