Back to articles
Aethir Adapter Exploit : Complete Technical Postmortem Report

Aethir Adapter Exploit : Complete Technical Postmortem Report

via Dev.toSaravana kumar

Aethir, a decentralized GPU cloud computing platform focused on providing affordable AI and gaming compute resources, faced a security incident on April 9, 2026. The attack targeted the AethirOFTAdapter contract on BNB Chain. This contract acts as an omnichain bridge adapter for ATH tokens. The attacker successfully drained a substantial amount of ATH tokens. However, the Aethir team acted quickly to contain the damage. As a result, the main token supply on Ethereum stayed completely safe. User losses remained limited, and the project promised full compensation soon. Technical Details: Exploit Method: transferOwnership(address newOwner) New Owner Address: 0xd5fa8ac45d6a0984d14f3b301b18910948deb11a Total Drained: Approximately 423,000 ATH (PeckShield estimate ~$400K+) Victim Contract: AethirOFTAdapter (Omnichain Fungible Token Adapter on BNB Chain) Vulnerability Type: Access Control Failure (missing or bypassed onlyOwner modifier and weak ownership validation) Bridge Used: Symbiosis Fin

Continue reading on Dev.to

Opens in a new tab

Read Full Article
3 views

Related Articles