Yu Xian, founder of SlowMist, posted on the X platform that "Ekubo's related contracts were maliciously exploited. The reason is that if a user previously authorized the relevant tokens to: 0x8CCB1ffD5C2aa6Bd926473425Dea4c8c15DE60fd; such as user 0x765DEC's unlimited WBTC authorization (158 days ago): the attacker could designate the authorized user as the payer, and in the payCallback, have the contract call WBTC transferFrom(victim, Ekubo Core, amount), and then transfer the assets to the attacker through the withdraw/pay settlement process of Ekubo Core (0xe0e0e08A6A4b9Dc7bD67BCB7aadE5cF48157d444). This operation was executed 85 times, each time 0.2 WBTC, ultimately resulting in a loss of 17 WBTC for user 0x765DEC." WBTC. Users are advised to install the official software as soon as possible and check the following contract authorizations: 0x8ccb1ffd5c2aa6bd926473425dea4c8c15de60fd (V2) 0x4f168f17923435c999f5c8565acab52c2218edf2 (V3) Arbitrum: 0xc93c4ad185ca48d66fefe80f906a67ef859fc47d (V3).