$41M UXLINK Treasury Heist: Admin Access Stolen, Infinite Tokens Minted, Attacker Phished in Stunning Web3 Collapse

$41M UXLINK Treasury Heist: Admin Access Stolen, Infinite Tokens Minted, Attacker Phished in Stunning Web3 Collapse

Source: UXLINK Rekt


UXLINK’s treasury was emptied across multiple blockchains in a high-impact hack that began with a simple but catastrophic delegateCall. This vulnerability allowed someone with multisig access to effectively remove existing admins and install themselves as the new sole owner of the vault-triggering a series of devastating thefts and token inflation.


The Admin Takeover: When Trusted Access Turns Rogue

  • The attacker wasn’t a typical hacker exploiting a smart contract bug.
  • Instead, the breach was an administrative betrayal: an insider or compromised admin key holder hijacked control.
  • One function call booted out old admins; another installed a malicious new admin.
  • The contract blindly obeyed whoever held the keys-showcasing the risks when admin trust is absolute.

Initial Damage: Millions Gone in Minutes

  • On Ethereum Mainnet alone, initial losses reached about $6.6M across ETH, USDT, wBTC, USDC.
  • A second wave of theft on Ethereum added approximately $11.3M, including DAI, USDT, USDC, and wBTC.
  • On Binance Smart Chain (BSC), smaller sums totaling about $27K were also stolen.
  • Combined, the initial theft was nearly $18 million.

Infinite Token Minting & Multi-Chain Laundering

  • After draining treasury assets, the attacker exploited UXLINK’s mint function.
  • They minted trillions of unauthorized tokens, severely inflating UXLINK’s token supply.
  • These rogue tokens were swapped across chains (Arbitrum to Ethereum) for ETH worth over $41 million total.
  • Multiple wallets and decentralized exchanges were used to launder the stolen assets effectively.

Cosmic Justice: Attackers Attacked

  • Just as the attacker was cashing out, they fell prey to a phishing attack.
  • At 02:15 UTC on September 23, 542 million unauthorized UXLINK tokens were drained from the attacker’s wallet.
  • The stolen tokens ended up with the infamous Inferno Drainer, a phishing group specialized in extracting crypto from wallets.
  • SlowMist confirmed even skilled hackers can fall victim to phishing scams – a reminder that security flaws aren’t limited to protocols, but people too.

The Fallout: Silence, Panic, and Token Swap

  • UXLINK initially remained quiet while the treasury drained.
  • Only after nearly an hour did they acknowledge the security breach.
  • Panic ensued: UXLINK’s token price plummeted from $0.30 to $0.072 as unauthorized tokens flooded exchanges.
  • UXLINK launched a token swap, migrating to a new fixed-supply contract on Ethereum without mint permissions.
  • They excluded “illegally issued” tokens from the swap and promised compensation plans depending on recoveries.
  • Law enforcement and forensics firms got involved, but most stolen funds remain untraceable.

  • UXLINK’s hack wasn’t caused by a smart contract flaw but by an insider or compromised privkey.
  • This raises a fundamental question-who truly controls on-chain assets when admin keys can be misused?
  • While DeFi bugs can be patched transparently, admin key compromises often get swept under the rug.
  • This incident underscores the dangers of trusting any single point of control in Web3 projects.

Key Takeaway:

This hack exposes the vulnerability of multisig wallets when admin keys fall into the wrong hands. The fallout-multi-chain theft, infinite token minting, and eventual phishing of the attacker-reveals that Web3 security is as much about human practices as it is about code.

For developers, founders, and security researchers: always assume the worst from internal access. Build with minimal trust and robust monitoring, because in Web3, administrative control is often the true attack vector.