Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
DeFi News

Aftermath Finance Perps on Sui Exploited for $1.14M

Aftermath confirmed afSUI staking, AMM pools, and other products remain safe as it works with security firm Blockaid on recovery.

Written By:
Dhara Chavda

Last updated: 6 minutes ago
Published 6 minutes ago
Share
Last updated: 6 minutes ago
Published 6 minutes ago
Aftermath Finance Perps on Sui Exploited for $1.14M
Show AI Summary
Attackers exploited a vulnerability in Aftermath Perps’ contract logic, allowing negative builder code fees to be set, resulting in a $1.14 million loss.
The exploitation centered on a mechanism meant to rebate trading fees, which was misconfigured to permit payouts from the protocol instead of discounts.
Aftermath’s team has paused perps trading and is working with Blockaid to recover from the incident, with other protocol components remaining operational.

Aftermath Finance, the fully on-chain perpetual futures exchange on the Sui blockchain, has confirmed it was exploited for approximately $1.14 million after attackers identified a vulnerability that allowed negative builder code fees to be set on its perps protocol — a misconfiguration the team described bluntly as “wrongly” permitted in the contract logic.

Attention Aftermath community – We’ve identified an exploit affecting the protocol.

Our team is actively investigating alongside leading security partners. As a precaution, the protocol has been paused and measures are being taken to minimize potential impact to user funds.…

— Aftermath Finance (🥚, 🥚) (@AftermathFi) April 29, 2026

The disclosure came in a series of X posts late Tuesday from the Aftermath team and co-founder airtx, who said the team is currently in a “war room” with on-chain security firm Blockaid working on recovery. The protocol’s perps trading has been paused; spot trading, the cross-protocol smart router, the afSUI liquid staking derivative, and Aftermath’s AMM pools remain operational and unaffected.

What Was Exploited

The attack vector centered on builder code fees—a mechanism on Aftermath Perps that rebates a portion of trading fees back to integrating front-ends or order-routing services. The contract logic, by Aftermath’s own admission, “allowed negative builder code fees” to be set, meaning a value below zero could be configured.

A negative fee is, in effect, a payout from the protocol to whoever sets it—turning what should be a discount mechanism into an extraction vector. The attacker exploited this to drain approximately $1.14 million from the perps market before the team paused the protocol.

In its statements, Aftermath was direct about scope:

  • “ONLY PERPS WAS EXPLOITED.”
  • “All our other packages/products remain safe.”
  • “The only vulnerability its our perps protocol which allowed negative builder code fees to be set.”

The Sui wallet address associated with the attacker—0x1a65086c85114c1a3f8dc74140115c6e18438d48d33a21fd112311561112d41e—is being tracked publicly via Suivision, the Sui block explorer, and the team has now shifted from containment to recovery.

Aftermath’s Architecture and Why This Matters

Aftermath Perps is one of Sui’s flagship DeFi products, known for being the only major perpetuals exchange on the chain that runs a fully on-chain central limit order book (CLOB). Per Aftermath’s documentation, every order, cancellation, trade, and liquidation executes transparently on Sui’s validators—a design choice the team has marketed against the hybrid off-chain matching model used by competitors like Bluefin.

That fully on-chain approach was made possible by Sui’s parallel execution model, low latency, and storage rebates—and Aftermath co-founder airtx has previously argued the design unlocks “thicker books” because anyone can permissionlessly access the order book.

The architectural distinction matters here because the exploit was not a failure of the on-chain matching engine, the order book design, or Sui’s underlying consensus. It was a misconfiguration in fee logic — the kind of bug that can affect any protocol regardless of how its core engine is designed.

Blockaid in the Loop

The involvement of Blockaid—the on-chain security platform trusted by MetaMask, Coinbase, and other major wallets for real-time fraud detection—is notable. Blockaid was active in the same week, issuing a separate ongoing-exploit warning for ZetaChain’s GatewayEVM contract, urging users to revoke approvals immediately.

For Aftermath, Blockaid’s role is post-incident: helping with attack-vector analysis, attacker-wallet tracing, and recovery coordination. The firm has not yet issued a public statement on the Aftermath incident.

A Brutal Month for Sui DeFi

The Aftermath exploit lands in what is shaping up to be a punishing stretch for Sui-native DeFi. Earlier in April, Volo lost roughly $3.5 million in a vault exploit (with about 60% recovered), and just two days ago, Scallop — Sui’s leading lending protocol — disclosed a $142,000 flash loan exploit on a deprecated sSUI rewards contract.

Across the broader DeFi sector, April 2026 has already seen more than $606 million in losses, making it one of the worst months on record for crypto exploits since February 2025. Kelp DAO’s $292 million rsETH exploit is the largest, followed by Drift Protocol’s $285 million social engineering attack and exploits across Mantra Chain, Lista DAO, and others.

Sui’s ecosystem has been a particular target: between Cetus Protocol’s $223 million hack last May, Volo, Scallop, and now Aftermath, the chain has accumulated an uncomfortable concentration of exploit headlines despite its Move language safety guarantees and parallel execution model. As one analyst observed after Scallop, “Audited does not mean safe.”

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Dhara Chavda- Crypto Research Analyst at The Crypto Times
By Dhara Chavda
Follow:
Dhara Chavda is a Content Strategist and Research Analyst with 5 years of experience in the crypto industry. She holds a Bachelor’s degree in Computer Engineering and brings a strong technical perspective to her work. Dhara specializes in DeFi, price analysis, and the core mechanics of cryptocurrencies. She also works on crypto news, including research, analysis, and assigning stories, ensuring accurate and timely coverage of key developments in the space.

Latest News

Bhutan’s Quiet Bitcoin Exit: The Kingdom Has Sold 9,579 BTC So Far
Bhutan’s Quiet Bitcoin Exit: The Kingdom Has Sold 9,579 BTC So Far 
POSCO, Hana Financial, and Dunamu Partner to Replace SWIFT with Blockchain 
POSCO, Hana Financial, and Dunamu Partner to Replace SWIFT with Blockchain 
How a ‘Perfect Storm’ of 3 Bugs Led to ZetaChain’s $333K GatewayEVM Exploit
How a ‘Perfect Storm’ of 3 Bugs Led to ZetaChain’s $333K GatewayEVM Exploit
Celsius Co-Founder Ordered to Pay $10M as Case Nears End
Celsius Co-Founder Ordered to Pay $10M as Case Nears End
Monad’s “Triumph”: X Account Returns, But What Does the Blockchain Actually Do
Monad’s “Triumph”: X Account Returns, But What Does the Blockchain Actually Do?

Find Us on Socials

You may also like

Syndicate Commons Bridge Falls Victim to a Fresh DeFi Exploit: ~$400K Stolen

Syndicate Commons Bridge Falls Victim to a Fresh DeFi Exploit: ~$400K Stolen

EIP-7702 Flaw Drains 1,988 QNT From Ethereum Pool

EIP-7702 Flaw Drains 1,988 QNT From Ethereum Pool

Compound DAO Proposes Up to 3,000 ETH for DeFi United Recovery Push

Compound DAO Proposes Up to 3,000 ETH for DeFi United Recovery Push

DeFi United Targets $71M Recovery From Aave in rsETH Backing Plan

DeFi United Targets $71M Recovery From Aave in rsETH Backing Plan

The Crypto Times Logo PNG

Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

Stay Updated

All News
Exclusive
Opinions
Learn
Podcasts

Company

About Us
Our Authors
Editorial Policy
AI Policy
Advertorial Policy

Get In Touch

Contact Us
Career

Find Us on Socials

X-twitter Linkedin Telegram Youtube Instagram

© 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

DMCA.com Protection Status
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Cookie policy
Do Not Sell or Share My Personal Information