According to Beosin EagleEye platform monitoring, the Xave Finance project was hacked, resulting in a 1,000-fold increase in RNBW issuance. The attack transaction is 0xc18ec2eb7d41638d9982281e766945d0428aaeda6211b4ccb6626ea7cff31f4a. The Beosin security team analyzed and found that the attacker first created the attack contract 0xe167cdaac8718b90c03cf2cb75dc976e24ee86d3. The attack contract first called the executeProposalWithIndex() function of the DaoModule contract 0x8f90 to execute the transfer proposal. . Finally, the hacker converted it into xRNBW and stored it on the attacker’s address (0x0f44f3489D17e42ab13A6beb76E57813081fc1E2). At present, the stolen funds are still stored in the attacker's address, and Beosin Trace will continue to track the stolen funds.