
Briefing
A recent exploit targeted a multi-signature wallet, leveraging a delegateCall vulnerability to grant an attacker full administrative control. This critical flaw allowed the malicious actor to remove legitimate admin privileges, replace them with their own, and subsequently drain approximately $4.5 million in stablecoins, Wrapped Bitcoin, and Ethereum. The attacker further destabilized the market by minting 10 trillion unauthorized tokens, causing the protocol’s token price to plummet by 70% and eroding $2.1 billion in market value. This incident highlights the profound financial consequences arising from technical misconfigurations in ostensibly secure systems.

Context
Prior to this incident, multi-signature wallets were widely considered a robust security measure, requiring multiple approvals for transactions and intended to mitigate single points of failure. However, the prevailing attack surface in decentralized finance (DeFi) continues to include complex smart contract interactions, where subtle logic flaws can be exploited. This exploit leveraged a known class of vulnerability related to improper handling of delegateCall functions, demonstrating that even established security primitives can be undermined by implementation errors.

Analysis
The incident’s technical mechanics centered on a delegateCall vulnerability within the multi-signature wallet’s smart contract. The attacker exploited this flaw to execute a malicious function, specifically addOwnerWithThreshold , which allowed them to bypass existing access controls. By replacing the legitimate admin addresses with their own, the attacker gained unauthorized administrative privileges.
This compromise enabled the direct draining of funds from the wallet and facilitated the unauthorized minting of a vast quantity of new tokens, leading to severe market dilution and a significant drop in the token’s value. The chain of cause and effect demonstrates how a single misconfigured function can unravel an entire protocol’s security posture.

Parameters
- Protocol Targeted ∞ UXLINK
- Attack Vector ∞ DelegateCall Vulnerability in Multi-signature Wallet
- Financial Impact ∞ $4.5 Million Drained Directly; $2.1 Billion Market Value Erosion
- Assets Drained ∞ USDT, USDC, WBTC, ETH
- Unauthorized Activity ∞ 10 Trillion Tokens Minted
- Token Price Impact ∞ 70% Collapse
- Date of Incident ∞ September 2025

Outlook
Immediate mitigation for users involves reassessing exposure to protocols utilizing complex multi-signature wallet implementations, particularly those with opaque delegateCall logic. This incident will likely establish new security best practices emphasizing rigorous, continuous auditing of all contract functions, especially those granting administrative control. Protocols must prioritize real-time monitoring of on-chain activity and robust contingency plans for rapid response, including token swaps and freezing suspicious deposits. The contagion risk extends to similar DeFi protocols that may share analogous architectural vulnerabilities, necessitating a systemic review across the ecosystem.