Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Early Year Hacker Attack Causes $1.5 Million Loss, ARB Network Proxy Contract Security Crisis Exposed
ARB Network experienced a serious smart contract security incident in early January of this year. According to monitoring data from security firm CyversS, the attack resulted in a direct economic loss of $1.5 million. The incident involved upgradeable contracts of the USDGambit and TLP projects, with the attack method involving malicious manipulation of the ProxyAdmin permission structure, ultimately leading to a large amount of funds being stolen. This event once again exposed serious vulnerabilities in proxy contract governance within the Layer 2 ecosystem.
Precise Theft of $1.5 Million: How Hackers Manipulate Upgradeable Contracts
Based on on-chain forensic analysis, the attacker successfully took control of the TransparentUpgradeableProxy by deploying a custom contract. Specifically, the hacker address “0x763…12661” performed a series of operations targeting the proxy contract, ultimately transferring a total of $1.5 million in USDT from the victim address “0x67a…e1cb4”.
The key to this attack was hijacking the governance layer of ProxyAdmin. In upgradeable contract architecture, ProxyAdmin controls the upgrade permissions of the logic contract, serving as the system’s vital core. The attacker exploited mismanagement of deployer permissions, bypassed normal access restrictions, and carried out unauthorized fund transfers. The victim was unaware of the breach until the stolen assets had already begun crossing different blockchains.
Fund Obfuscation Path: From Arbitrum to Mixer Protocols
After stealing $1.5 million, the attacker did not hold the funds directly but took a series of steps to cover their tracks. First, the hacker quickly bridged USDT to the Ethereum blockchain, then deposited the funds into Tornado Cash—a well-known decentralized privacy protocol. Through Tornado Cash’s mixing mechanism, the funds’ trail was thoroughly obscured, greatly increasing the difficulty for victims to recover the stolen assets.
This series of operations demonstrates the attacker’s professionalism and premeditation. From technical smart contract attacks, cross-chain fund transfers, to using privacy protocols for obfuscation, the entire process forms a complete chain of crime, making it difficult for law enforcement and the ecosystem to effectively trace and freeze these funds.
Proxy Contract Governance Vulnerability: A Common Flaw in DeFi Infrastructure
The issues exposed by this incident go far beyond a single project. In the entire DeFi ecosystem, upgradeable contracts have become standard, but most projects have serious vulnerabilities in ProxyAdmin permission management. Centralized permission control means that a single point of failure can lead to huge losses— as demonstrated by this $1.5 million theft.
It is worth noting that similar attack vectors are not new, yet many projects still overlook them. Some projects lack proper security for deployer address keys, or have poorly designed multi-signature mechanisms for contract upgrades, providing opportunities for hackers. This incident serves as a wake-up call for the entire ecosystem—robust governance structures, multi-signature verification, time-lock mechanisms, and other protective measures are no longer optional but essential.