Wasabi Protocol Drained of $5 Million After Admin Key Compromise Spans Four Chains

No comments

Another day, another DeFi protocol drained. Wasabi Protocol, a perpetuals trading platform operating across Ethereum, Base, Berachain, and Blast, lost between $4.5 million and $5.5 million on April 30 after an attacker compromised the deployer admin key and used it to systematically empty vault contracts across all four chains.

The attack was fast and methodical. Once the attacker had the admin key, they called grantRole on Wasabi's permission contract to give themselves full admin privileges with zero delay - no timelock, no waiting period. From there, according to The Block, they upgraded the protocol's perp vaults and Long Pool to malicious implementations that simply drained the balances.

What Got Hit

On Ethereum, the affected contracts included Wasabi's wWETH, sUSDC, wBITCON, wPEPE, and Long Pool vaults. On Base, the attack hit sUSDC, wWETH, sBTC, sVIRTUAL, sAERO, and sBRETT vaults. Berachain and Blast exposure added to the total loss.

Security firm Blockaid flagged the exploit as it was happening, which at least gave some users time to react - but the nature of an admin key compromise means there's very little the protocol itself can do once that key is in hostile hands. The attacker controlled the upgrade mechanism. They rewrote the contracts.

The Security Failure Is Embarrassingly Basic

This one stings because it's so preventable. The root cause wasn't a novel zero-day, a complex re-entrancy bug, or a subtle edge case in a cryptographic primitive. It was a single externally-owned account holding full ADMIN_ROLE in Wasabi's PerpManager with no multisig requirement, no timelock, and no governance process protecting that access.

That's table-stakes security for any protocol managing real user funds. Requiring multiple keys to sign a privileged action - or imposing a 24 or 48-hour delay before an upgrade takes effect - would have stopped this attack entirely. A timelock alone would have given users and security researchers time to notice the malicious transaction queued up and respond before it executed.

Wasabi isn't the first protocol to skip these protections and pay for it. It won't be the last. But the regularity with which centralized admin keys get compromised in DeFi - and the regularity with which the post-mortem reveals no multisig or timelock was ever in place - is genuinely hard to explain at this point in the industry's development.

Context: The Worst Month on Record

The Wasabi exploit landed at the tail end of April 2026, which closed as the worst month for crypto hacks since tracking began. DeFiLlama confirmed 30 separate incidents in April with total losses above $625 million - roughly one attack per day. Two incidents dominated: the Drift Protocol social-engineering theft (approximately $285 million) and the KelpDAO LayerZero bridge exploit ($292 million), both attributed by researchers to North Korea's Lazarus Group.

Wasabi's $5 million loss looks modest next to those numbers, but it's a useful reminder that the attack surface isn't limited to massive bridge contracts and well-funded protocols. Smaller perpetuals platforms with real user deposits and a single unprotected admin key are just as vulnerable - and the economic incentive to target them is real.

What Users Should Know

Wasabi Protocol paused the affected vaults and has posted about the incident on social channels. Users with open positions or deposits in the affected contracts should verify their status directly through official Wasabi channels and be skeptical of any recovery offers that arrive via DM - the fake refund scam that follows exploits is almost as reliable as the exploits themselves.

The broader lesson from April 2026 is one the industry keeps relearning: it doesn't matter how good the trading interface is, how competitive the fees are, or how much TVL a protocol has accumulated. If the admin key can drain everything in one transaction with no guardrails, eventually someone will get that key. Build accordingly.

---------------

Author: Alan Ward
Seattle News Desk

No comments