Wintermute muted in crypto winter

Ok, Sorry for the bad headline. Back to the topic now…

Wintermute was hacked for ~160m a few hours ago. I took a quick look and my best guess is that it was a hot wallet compromise due to the Profanity bug that was publicly disclosed a few days ago by 1inch team.

Wintermute’s Tokens being transferred to the attacker

The attack started with where Wintermute’s hot wallet ( started calling their vault contract ( to transfer tokens out to the hacker’s contract (

The vault only allows admins to do these transfers and Wintermute’s hot wallet is an admin, as expected. Therefore, the contracts worked as expected but the admin address itself was likely compromised.

The admin address is a vanity address (starts with a bunch of zeroes) which might have been generated using the famous but buggy vanity address generating tool called Profanity. Profanity has a critical bug that was disclosed by 1inch a few days ago.

Around the time that the disclosure happened, wintermute removed all ether from this admin address ( which suggests that they realized it might have been vulnerable. However, they forgot to remove this address as an admin from their vault.

The attacker funded this address using their own ether ( and then used this address to pull off the heist. All of it suggests that the attacker exploited the bug in Profanity to recover the private key of this hot wallet.

The attacker is likely a seasoned hacker/solidity developer. They created a helper contract, deposited stables into curve to avoid blacklisting, and figured out this vulnerability in a closed sourced vault contract in the first place. ps. I was again asleep when this happened.

Wintermute said they are still solvent and healthy so there’s no need to panic.

This was originally meant to be just a twitter thread with early analysis but twitter is hiding all tweets with links to etherscan so I was forced to write this blog…..

Leave a Comment

Your email address will not be published. Required fields are marked *