Market Times:

London: 3:22:49 AM

New York: 10:22:49 PM

Singapore: 10:22:49 AM


Cardex Game Suffers $400K Exploit, Affecting 9,000 Wallets

The exploit was described as a "session key" attack, where an unauthorized entity accessed wallets linked to Cardex and withdrew funds.

ZKsync

Cardex Game has suffered a security breach, leading to substantial financial losses and affecting thousands of user wallets. The attack, which targeted the game’s interface, has raised concerns about the platform’s security and broader risks for blockchain-based projects.

Cardex is a blockchain-powered trading card game built on Abstract, an Ethereum layer-2 network. Players collect digital tokenized cards and compete using them within the ecosystem.

A $400K Security Breach

On Tuesday, Abstract shared an initial post-mortem on X (formerly Twitter) detailing the security breach. The incident resulted in the loss of approximately $400,000 in Ether (ETH) from about 9,000 wallets connected to Cardex.

The exploit was identified as a “session key” attack, where an unauthorized entity accessed wallets linked to Cardex and withdrew funds.

According to Abstract contributor Cygaar, the breach stemmed from a compromised session signer wallet used collectively by all Cardex players. The attacker exploited a leaked key embedded in Cardex’s frontend code, exposing weaknesses in session key management.

By gaining control of the session key, the hacker was able to execute transactions on behalf of users, transferring and selling assets to acquire ETH. However, ERC20 tokens and NFTs in affected wallets remained secure and were not impacted by the exploit.

Mismanagement of Wallet Credentials

Notably, the post-mortem also emphasized that the issue was not related to Abstract’s core infrastructure or the Abstract Global Wallet (AGW). Instead, it resulted from Cardex’s mismanagement of critical wallet credentials, particularly session keys.

AGW uses these session keys to improve the user experience by letting apps start temporary wallet sessions. These keys give specific permissions to third-party apps; therefore, secure management is important to prevent misuse.

Abstract had advised users to stop interacting with Cardex and revoke any active sessions to minimize further exposure. Moving forward, all projects using session keys on Abstract’s platform must undergo security audits.

“We will continue to consult with builders and security experts regularly to refine our processes and set the industry standard for security and user protection,” Abstract stated in its post.

Jonathan Agozie

Jonathan Agozie is a writer dedicated to delivering clear, well-researched, and technically accurate content on blockchain, cryptocurrency, and Web3 technologies. With a strong background in these fields, he simplifies complex topics for a broad audience, ensuring clarity without compromising depth.