Haotian: Why was the 15,000 cmETH hacked by Bybit able to be recovered?

👤 energyed@Quinn 📅 2026-04-04 21:27:26

In the recent Bybit theft incident, mETH Protocol’s security mechanism successfully intercepted 15,000 cmETH and recovered US$42 million in losses. This article will provide an in-depth analysis of the operating principle of cmETH and its three major security protection mechanisms, and explore its strategic value in the Mantle ecosystem and its key role in dealing with hacker attacks. This article is derived from a Twitter research article written by Haotian and reprinted by wublockchain.
(Preliminary summary: After the Bybit theft case, Safe multi-signature wallet suspends support for Ledger: additional transaction checks will be implemented and services will be gradually restored)
(Background supplement: mETH incentive activity: participate in Bybit Web3 staking, enjoy 7% APY and 2 times mining fee subsidy)

Bybit disclosed by @SlowMist_Team @evilcos security team yesterday The stolen asset tracking analysis report mentioned that a sum of 15,000 cmETH was fortunately blocked by @mETHProtocol from being withdrawn, saving a loss of $42m. Many friends must be curious about what is going on?

mETH Protocol is a Mantle layer2 chain that allows users to generate native income when depositing ETH in layer 2. The liquidity staking protocol launched on the Ethereum main network is a liquidity staking asset with a cumulative deposit volume second only to stETH, wBETH, and rETH.

Mantle uses mETH as the core to absorb the liquidity on different layer2 chains, and once became the interactive liquidity scheduling center of layer2. It can be imagined how important mETH is to the strategic value of the Mantle chain.

cmETH is a re-pledged asset of mETH, which means that users can re-pledge the circulating mETH assets and exchange them for cmETH assets. Compared with mETH, although cmETH bears one more re-pledge leverage risk, it can be mined in various campaign activities of layer 2 to obtain its new protocol governance token $COOK.

In short, cmETH is an equity certificate asset that circulates in the layer2 network and will interact with various layer2 protocols.

It is precisely because of this complex business interaction logic that the cmETH protocol has added three key security mechanisms in its design:

  1. The address blacklist mechanism, as the name suggests, can quickly blacklist addresses marked as hackers to restrict their transfers or interactions cmETH Assets;
  2. The contract can be temporarily suspended. In the event of an emergency, the team has permission to urgently suspend withdrawal operations to prevent the circulation of suspicious assets;
  3. The delayed withdrawal mechanism adopts a FIFO (first in, first out) queuing mechanism. The contract has a built-in withdrawal delay of up to 7 days (8 hours in this event), which is equivalent to a calm processing-response time, giving the team enough time to identify abnormal withdrawal behavior on the chain.

Although it seems that a certain degree of decentralization has been sacrificed for security, don’t forget that cmETH is a re-pledged (leveraged) asset superimposed on mETH. Its main business scenario is to use it as an equity certificate for mining in various DeFi protocols. Its security will affect the overall system liquidity security of each cross-chain and cross-protocol.

At this stage, as it is an important component of the Mantle ecosystem, it is natural to make some additional security mechanism considerations and designs to deal with hacker attacks and emergencies.

I just didn’t expect that this design of cmETH did not play into the complex combination ecological environment of on-chain DEX, but instead took the lead in making a great contribution to Bybit’s blocking of assets.

Étiquette:
partager:
FB X YT IG
energyed@Quinn

energyed@Quinn

Éditeur de blockchain et de cryptoactifs, axé surpolitiqueAnalyse et informations sur le contenu du domaine

Commentaire (10)

Dashiell 11il y a quelques minutes
Đồng ý, tương lai là kỷ nguyên của sự hợp tác cởi mở.
Laura 21il y a quelques minutes
Việc áp dụng các tính năng chống giả mạo trong truy xuất nguồn gốc đã được thảo luận kỹ lưỡng.
Luke 26il y a quelques minutes
Ngành công nghiệp vẫn cần thời gian để ổn định.
Sư tử 2il y a des heures
Các quan điểm là hợp lý và phân tích là tốt.
Douglas 2il y a des heures
Ý kiến hay, tôi ủng hộ.
Hoa hồng 5il y a des heures
Làm thế nào để lựa chọn giữa chuỗi công khai, chuỗi liên minh và chuỗi riêng tư?
cơn gió lớn 7il y a des heures
Bài viết rất cảm động, cảm ơn bạn đã biên soạn nó.
Lydia 12il y a des heures
Trong tương lai, nhiều công ty truyền thống sẽ nắm lấy blockchain.
Justin 22il y a des heures
Nhiều quan niệm là rượu cũ bình mới.
Tối đa 23il y a des heures
Việc phân nhánh xảy ra như thế nào? Sự khác biệt giữa nĩa mềm và nĩa cứng là gì?

Ajouter un commentaire

Contenu populaire