
According to GoPlus’s technical analysis of the attack incident and the official statement from Aftermath Finance released on April 30, the perpetual contract platform Aftermath Finance on the Sui chain was attacked on April 29, suffering losses of more than $1.14 million. With support from Mysten Labs and the Sui Foundation, the project team announced that all users will receive full compensation.
According to GoPlus’s technical analysis, the attacker is suspected of stealing the ADMIN privilege of the add_integrator_config function, and then exploiting the symbol mismatch vulnerability in the calculate_taker_fees function to extract tokens for profit repeatedly.
According to Aftermath Finance’s official statement, the core mechanism that was exploited is “builder code fees”—a mechanism that refunds part of transaction fees to the integration front-end or order routing service. The statement notes that the contract logic “incorrectly allows setting negative builder code fees.” This design flaw enables the attacker to configure a fee value below zero, allowing the attacker to continuously extract funds from the protocol.
Aftermath Finance stated that the scope of impact is limited to the perpetual contract protocol; spot trading, cross-protocol smart routers, afSUI liquid staking derivative products, and AMM pools were not affected and remain in normal operation. Aftermath Finance also emphasized that this attack is not a security issue with the Move contract language itself.
The Sui wallet address associated with the attacker, 0x1a65086c85114c1a3f8dc74140115c6e18438d48d33a21fd112311561112d41e, has been publicly tracked via the Sui block explorer Suivision.
According to a public statement by Aftermath Finance co-founder airtx on the X platform, after the attack occurred, the Aftermath Finance team temporarily halted malicious transactions and worked with on-chain security company Blockaid in a “war room” to carry out recovery efforts. Blockaid is an on-chain security platform trusted by MetaMask, Coinbase, and other major wallets, responsible for assisting with attack vector analysis and tracking the attacker’s wallet.
According to Aftermath Finance’s latest announcement, with support from Mysten Labs and the Sui Foundation, all affected users will receive full compensation; Aftermath Finance said it is currently continuing efforts to recover funds.
According to industry reports, in April 2026, the Sui ecosystem experienced multiple security incidents in succession: the Volo vault was attacked, losing approximately $3.5 million (about 60% has been recovered); Scallop disclosed a flash loan vulnerability targeting previously deprecated sSUI reward contracts two days before the attack, with losses of $142k.
According to industry statistics, total DeFi vulnerability losses in April 2026 exceeded $606 million, one of the most severe months since February 2025. Major incidents include the Kelp DAO rsETH vulnerability ($292 million), the Drift Protocol social engineering attack ($285 million), and exploitation of vulnerabilities in projects such as Mantra Chain and Lista DAO.
According to GoPlus technical analysis and Aftermath Finance’s official statement, the attack occurred on April 29, 2026. The attacker exploited the ADMIN privilege of the add_integrator_config function and the symbol mismatch vulnerability in the calculate_taker_fees function, repeatedly extracting tokens by setting negative builder code fees, confirming losses of $1.14 million.
According to Aftermath Finance’s official statement, with support from Mysten Labs and the Sui Foundation, all affected users will receive full compensation; Aftermath Finance said it is currently continuing efforts to recover funds.
According to Aftermath Finance’s official statement, this attack is not a security issue with the Move contract language itself. Instead, it was caused by a fee configuration error in the logic of a specific protocol contract. Other products such as spot trading, afSUI liquid staking, and AMM pools were not affected.
Related News
SCAM meme coin crashes and plunges 95%; a trader loses $150k
SWEAT agreement was stolen 13.71 billion tokens; after pausing the contracts, users’ funds were fully restored
Polymarket denies allegations of a leak of 300k records, saying its API data is publicly available and auditable
Tropykus Agreement announces closure; users must complete withdrawals and repayments by July 27
ZetaChain pauses cross-chain transactions; the GatewayEVM smart contract was attacked