# Zoth Vault Breach: Admin Key Exploit Analysis

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FGiWBHy0h6cJ1vTcDMIUz%2FCopy%20of%20Blockscope%20Business%20Card%20(2).png?alt=media&#x26;token=53a7546f-5224-484e-b847-11c6e8b098df" alt=""><figcaption></figcaption></figure>

## Summary

In 2024, the crypto space lost a staggering **$2.2 billion** across more than **303 separate exploits**. Alarmingly, incidents involving [**Private Key and Admin Privilege compromises** topped the charts, accounting for over **43% of all cases**](https://x.com/BlockscopeCo/status/1881782673531912686). Despite such clear security lessons, 2025 has already demonstrated that many protocols still struggle with fundamental key management practices.

On **March 21st, 2025**, [Zoth](https://x.com/zothdotio?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor)—a DeFi protocol bridging Traditional Finance (TradFi) and blockchain through tokenized Real-World Assets (RWAs)—experienced a severe exploit, losing approximately **$8.4 million**. The exploiter compromised Zoth’s admin keys, upgrading the **USD0PPSubVaultUpgradeable proxy contract** to a malicious implementation. This allowed the withdrawal of **8,851,750.3737 USD0++ tokens**, quickly converted first into **DAI**, then into **ETH**, and moved off-chain within minutes. Security firms [**SlowMist**](https://x.com/SlowMist_Team/status/1903020756830974217) and [**Cyvers**](https://x.com/CyversAlerts/status/1903021017460600885) promptly confirmed the exploit, highlighting critical vulnerabilities in admin key security.

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FE9dQqQ8sQLM5FPHZnAI7%2FScreenshot%202025-03-25%20202608.png?alt=media&#x26;token=5f3fc234-ba37-4151-a7c9-3663496b659c" alt=""><figcaption><p><a href="https://x.com/zothdotio/status/1903024419028734265">Zoth's repsonse after the exploit</a></p></figcaption></figure>

Notably, this was Zoth’s second exploit in the same month. [On **March 1st**, a separate vulnerability in Zoth’s Loan-to-Value (LTV) validation logic resulted in a **$285,000 loss**,](https://blog.solidityscan.com/zoth-hack-analysis-80ba3ac5076b) where attackers manipulated liquidity pools to mint stablecoins without sufficient collateral.

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FLZ3HP75Ppilvu9tM5GMU%2FScreenshot%202025-03-25%20204000.png?alt=media&#x26;token=d0c65ad0-d110-46c0-9eb8-6be8a6457a59" alt=""><figcaption><p><strong>Zoth's March 1st Exploit;  Attack Tx</strong>.<strong><code>0xc3f70057e261af554c6acf6a372389899f0c2d7d1ebd27311e39525dee88fb39</code></strong></p></figcaption></figure>

### **What is Zoth?**

[Zoth](https://x.com/zothdotio?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) is a DeFi protocol designed to bridge **TradFi** and **on-chain finance** through the tokenization of **Real-World Assets (RWAs)**. Central to Zoth’s platform is ZeUSD, a permissionless, omnichain (operates across multiple networks) stable token backed by high-quality assets like U.S. Treasury Bills and ETFs. Zoth aims to enhance liquidity, enabling users to engage seamlessly with decentralized exchanges, liquidity pools, and yield-generating DeFi products.

### Key Addresses Involved:

* **Main Exploiter:** `0x3b33c5Cd948Be5863b72cB3D6e9C0b36E67d01E5`
* **Victim Contract (Proxy):** `0x82f3a0392F58C50fa90542519832471BaE93e43e`
* **Exploiter 2 (Holding Funds):** `0x7b0cd0D83565aDbB57585d0265b7D15d6D9f60cf`
* **Malicious Implementation Contract:** `0xc89d7894341e13d5067d003af5346b257d861f56`
* **Zoth deployer:** `0x3604582f56565d7060d73829ffb9ebd579218dca`&#x20;

Let’s now dive into the **root cause analysis** of the exploit to uncover how it happened and why it’s a wake-up call for the entire DeFi ecosystem.

## Decoding the Exploit

The exploit on March 21st resulted from the compromise of **Zoth’s deployer wallet**, providing the attacker unrestricted administrative access. Leveraging these privileges, the attacker executed the **`upgradeToAndCall`** function on the **USD0PPSubVaultUpgradeable proxy contract**, installing a malicious implementation at address `0xc89d7894341e13d5067d003af5346b257d861f56`. This upgrade allowed the attacker to withdraw **8,851,750.3737 USD0++ tokens** (valued at **$8.4 million**), rapidly converting these funds first into **DAI**, then into **ETH**, before transferring them to an external address: `0x7b0cd0D83565aDbB57585d0265b7D15d6D9f60cf`.

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FEEqjHXAEUEJEeLtKSkKu%2FScreenshot%202025-03-25%20205636.png?alt=media&#x26;token=7e861d48-54ca-4078-b230-bf588ad62d2c" alt=""><figcaption><p><strong>Blockscope's transaction flow chart shows the Deployer wallet upgrading the USD0PPSubVaultUpgradeable proxy contract; Tx. hash</strong> <code>0xb2335f7bf58abbcaa006d0a2bed7db2c64a5dabed56fb1759260adc012c49abe</code></p></figcaption></figure>

The swift execution—from proxy contract manipulation to final fund transfer—reveals a carefully orchestrated exploitation of vulnerabilities stemming from insufficient admin key security measures.

## On-chain Activity

The exploit becomes notably clear and intuitive once visualized through our **Tracer tool**. The flowchart below precisely illustrates the sequence of on-chain events, starting from the compromised **Zoth Vault (Victim)**. Initially, the attacker swiftly converts the stolen **USD0++ tokens** into **DAI**, transferring these funds directly to the **Main Attacker** address. Subsequently, the **DAI** is sent to an intermediary address labeled **Exploiter 2**, which utilizes the decentralized exchange **CowSwap** to convert the funds into **4,222.8881 ETH**.&#x20;

Some of these assets then flow to **Exploiter 3** `0x2128e6b2a8adabb00450fee4a65a660233735c4f` and **Exploiter 4** `0xcb03931637cbc8d486df81f4226955f80e1acd45`, which eventually routes funds to        **Exploiter 5** `0x6ce41f95fc5514a3e8f74c5c500ef1b8a68e2316`, where a portion of the proceeds currently reside. This meticulously orchestrated series of transactions underscores the attacker’s swift, strategic approach and highlights the effectiveness of their methods for obscuring the trail of stolen funds.

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FcIxWmBZ0mcVas8EZfxUY%2Fimage.png?alt=media&#x26;token=adfbe48b-e180-47a1-b07a-70ee84ff514e" alt=""><figcaption><p><strong>Tracer visualizing the Zoth Exploit</strong></p></figcaption></figure>

## Exploit Breakdown&#x20;

### Proxy upgrade Execution at 8:46 UTC, March 21

The exploiter first **compromised Zoth’s deployer wallet** `0x3604582f56565d7060d73829ffb9ebd579218dca`, which holds admin privileges for the protocol’s upgradeable contracts. Leveraging this key, at **8:46 UTC,** the exploiter executed the **`upgradeToAndCall`** function on the **USD0PPSubVaultUpgradeable** proxy `0x82f3a0392f58c50fa90542519832471bae93e43e`installing a **malicious implementation** at Exploiter Contract `0xc89d7894341e13d5067d003af5346b257d861f56`, thereby granting the attacker **full control** over the vault.

**Transaction Hash:** `0xb2335f7bf58abbcaa006d0a2bed7db2c64a5dabed56fb1759260adc012c49abe`

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FYLqqsKk2gvL8iOfS9d1z%2FScreenshot%202025-03-25%20212831.png?alt=media&#x26;token=4669a2de-2f39-425e-89f0-d0154106b7b5" alt=""><figcaption><p>Using the <strong>Transaction Decoder</strong>, we can see the <strong>trace call</strong> of the transaction where the <strong>proxy was upgraded to the malicious contract</strong>.</p></figcaption></figure>

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FqK4s5Dqmu0G4NEH29YiM%2FScreenshot%202025-03-25%20212917.png?alt=media&#x26;token=3298f34c-2c77-4d05-bc9c-8775c59de16a" alt=""><figcaption><p>Transaction Logs showing the malicious contract being upgraded to the implementation contract, granting the attacker full control.</p></figcaption></figure>

**Note:** The reason behind the deployer wallet compromise is still unknown, but typically, these exploits are associated with phishing or social engineering attacks rather than complex exploits.

### **Vault Drained at 8:47 UTC, March 21**

Immediately after the upgrade, the malicious contract `0xc89d7894341e13d5067d003af5346b257d861f56` **withdraws 8,851,750.3737 USD0++ tokens**—worth approximately **$8.4 million** at the time. The withdrawal is completed in a matter of minutes, exploiting the proxy’s updated functions.

**Transaction Hash:** `0x33bf669d125d11c432ac9b52b9d56161101c072fd8b0ac2aa390f5760fb50ca4`

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FyqTY3a5Z849U43f3kWxp%2Fimage.png?alt=media&#x26;token=7e0487a4-4a91-47f6-bf3e-e1cca6940d3c" alt=""><figcaption><p>Exploiter receiving millions of USD0++ Tokens form Victim Contract</p></figcaption></figure>

### **Token Conversion at 9:01 UTC, March 21**

The stolen **USD0++** is quickly **swapped for DAI** using CowSwap. The exploiter transfers the DAI to a second address (Labelled as **Exploiter 2** `0x7b0cd0D83565aDbB57585d0265b7D15d6D9f60cf`, ) which subsequently **swap it for ETH**, using **CowSwap**

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FHq3o3pGRTQGqlJCATXxr%2FScreenshot%202025-03-25%20215806.png?alt=media&#x26;token=cb70bbdc-fa75-47a6-a633-2fe5192a427b" alt=""><figcaption><p>CowSwap is levraged to swap stolen USD0++ inot DAI and ETH</p></figcaption></figure>

### Final Transfer

As of March 25th, the newly acquired **ETH** is consolidated into the attacker’s external wallet, labelled as **Exploiter 2** and **Exploiter 5**, completing the heist. At this stage, the attacker has **full custody** of the stolen funds in ETH, making recovery substantially more difficult.

<div><figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FdXmuk7X34DUBJu6IsLcN%2FScreenshot%202025-03-25%20220345.png?alt=media&#x26;token=3c1b3412-05dc-4050-a46a-feebf21b42bb" alt=""><figcaption><p> <strong>Exploiter 5 holds 1,014 ETH</strong></p></figcaption></figure> <figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2Fw3eVYEhcm1a17l00SeMB%2FScreenshot%202025-03-25%20220450.png?alt=media&#x26;token=223be09b-f8ea-43d3-ab87-2af68487df39" alt=""><figcaption><p><strong>Exploiter 2 holds 3,233 ETH</strong></p></figcaption></figure></div>

## Analyzing Smart Contracts&#x20;

Identifying the root cause and unraveling exploit orchestrations in blockchain incidents can be highly challenging, particularly for users with limited technical expertise. **Blockscope's Contract Analysis and Contract Usage tools** significantly simplify this process by delivering clear, AI-powered explanations of smart contract functions.

For instance, during the investigation of the Zoth exploit, **Blockscope's Contract Usage** tool was instrumental in rapidly identifying and understanding the functionalities of the malicious contract at address `0x82f3a0392f58c50fa90542519832471bae93e43e`. Users, even those without extensive blockchain knowledge, could quickly comprehend each function's role by simply clicking the "Explain" button, thereby streamlining the investigative process and enabling effective analysis.

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2FRpGoFt0C2kdmqm62SYhf%2FScreenshot%202025-03-26%20234523.png?alt=media&#x26;token=707e54f1-1f8f-46c6-a195-b1323d88212c" alt=""><figcaption><p>Contract Usage tool displaying all functions of the malicious contract with AI-powered explanations.</p></figcaption></figure>

## Monitoring

To proactively track and respond to further developments, we've established a public watchtower monitoring all relevant addresses, particularly Exploiter 2 and Exploiter 5. Stakeholders can utilize this real-time visibility to enhance response measures and potentially mitigate further risks.

Access the public watchtower:[ **Zoth Exploit Watchtower**](https://www.blockscope.co/community/watchtowers/67e3628787903a6fe128e992)

## Conclusion

In summary, this incident underscores the critical need for rigorous security practices, continuous monitoring, and timely updates to smart contract permissions and controls. Enhanced vigilance and rapid response capabilities remain essential in minimizing damage and protecting decentralized ecosystems against similar sophisticated exploits.

At [**Blockscope**](https://www.blockscope.co/), we develop tools and technologies to safeguard your assets and empower individuals and organizations to take accountability. We remain committed to continuously enhancing our analytical capabilities and tools, actively contributing to a safer blockchain ecosystem for all stakeholders.

**Investigation by:** [**Tushar Tiwari**](https://in.linkedin.com/in/tushar-tiwari-1380271b7)**, Analyst @**[ **Blockscope**](https://www.blockscope.co/)

For more information, please reach out to us at **<hello@blockscope.tech>**

<figure><img src="https://2257097197-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fq4lJpWv2su6onUaxkWl4%2Fuploads%2Frpz0ZTdekVI6iHaK8FSS%2FBlcokscope.jpeg?alt=media&#x26;token=2675074f-ff78-476f-9d06-6e2be8c9ab27" alt=""><figcaption></figcaption></figure>

Disclaimer: Best Effort Investigation

This investigation and its findings represent our best effort based on the information available at the time. However, please be aware of the following limitations:

* The data used in this investigation may contain inaccuracies, omissions, or errors.
* Information sources may be incomplete or subject to change.
* New evidence may emerge that could alter the conclusions.
* Analysis and interpretations are based on current understanding and may evolve.

We have made every reasonable attempt to ensure accuracy but cannot guarantee that all information is entirely correct or complete. This report should be considered a snapshot of our current knowledge and understanding, subject to revision as new information becomes available.

&#x20;
