Griffin AI lost $3.5M in a cross-chain exploit within 24 hours of its Binance Alpha launch. An admin wallet compromise let the attacker abuse LayerZero’s peer validation to mint 5B $GAIN tokens. This report breaks down the exploit, fund flow, root cause, and Griffin AI’s response, with key lessons for cross-chain security.
On September 24, 2024, less than 24 hours after its launch on Binance Alpha, the Griffin AI protocol suffered a devastating cross-chain exploit, resulting in a loss of $3.5 million. The attack exploited LayerZero's peer trust system by convincing the bridge infrastructure that a malicious Ethereum contract was legitimate, enabling the unauthorized minting of 5 billion $GAIN tokens, inflating the total supply from 1 billion to 5.2985 billion tokens.
Griffin AI operates as a Web3 AI project that has recently launched with carefully planned tokenomics featuring a maximum supply of 1 billion tokens. The protocol utilized LayerZero for cross-chain functionality, which became the attack vector when an administrator's access was compromised, allowing the attacker to manipulate the peer validation system.
The exploit was executed through a carefully orchestrated sequence of steps exploiting a compromised admin address and LayerZero's cross-chain peer configuration. Below is a detailed breakdown of the attack:
The attacker likely gained control of an admin EOA on the BNB Chain (0x54a978238984d581edd3a9359dda9be53a930a7e), possibly through a phishing attack. This is evidenced by the transaction 0xf867a8e0b73cc279075cc760747b2a6a552bfa4623ad302f78d5516cb3062d88, where the attacker used the compromised admin to call the setPeer function on the legitimate GriffinAI token contract, an OmniFungible Token (OFT) on LayerZero. The function designated a fraudulent OFT token on Ethereum (0xba159054636E69080Ae7C756319e5C85498EFEb0) as a trusted peer, falsely legitimizing it for cross-chain interactions.
The attacker’s deployed counterfeit OFT token on Ethereum and configured the legitimate GriffinAI OFT token on the BNB Chain (0xAcf5A368eC5bb9e804C8AC0b508dAA5A21C92e13
) as its peer. Using this setup, the attacker minted 5 billion fake tokens (referred to as $TTTTT) on Ethereum.
The attacker bridged the 5 billion $TTTTT tokens from Ethereum to the BNB Chain via LayerZero. Due to the manipulated peer configuration, this action triggered the minting of 5 billion legitimate $GAIN tokens on the BNB Chain, exploiting the trust relationship established in the setPeer call.
The attacker swapped the 5 billion $GAIN tokens for stablecoins on PancakeSwap, executing multiple transactions.
The attacker converted the stablecoins to ~876 ETH using deBridge to transfer the funds to Ethereum. The majority of these funds were laundered through Tornado Cash to obscure their trail, with approximately 29 ETH remaining in the address 0x469CF0E22403E1af404926a25eadB34a7Bd85F4d
.
The primary vulnerability stemmed from the unauthorized configuration of a LayerZero peer using a compromised admin address 0x54a978238984d581edd3a9359dda9be53a930a7e. By invoking the setPeer The attacker established trust with a malicious contract, effectively bypassing LayerZero's cross-chain security protocols. This allowed arbitrary minting without proper verification.
Following the minting and dumping, the attacker bridged the proceeds to Ethereum via deBridge, obtaining ~876 ETH. The full amount was subsequently laundered through Tornado Cash to obscure the trail. Approximately 29 ETH remains in the address 0x469CF0E22403E1af404926a25eadB34a7Bd85F4d
, with recent inflows indicating ongoing activity.
The attacker’s wallet on BNB Chain (0xf3d17326130f90c1900bc0b69323c4c7e2d58db2) currently holds the 800,000,000 excess minted $GAIN tokens. These funds remain in the attacker's control, with no recoveries noted.
The Griffin AI hack shows how a single compromised admin wallet can trigger millions in losses. Don’t wait for a breach! Secure your cross-chain protocols with QuillAudits.
Following the exploit, the GriffinAI team, led by CEO Oliver Feldmeier, took decisive steps to address the breach and restore community trust. The key actions include:
The team secured the compromised cross-chain connection to prevent further unauthorized minting. They notified all exchanges to halt $GAIN deposits, withdrawals, and trading, and shut down the PancakeSwap liquidity pool to limit further damage.
The team announced a migration to a new, fully audited $GAIN token. A snapshot of pre-hack token balances will be used to restore all legitimate holders balances on a 1:1 basis, ensuring no community member is left behind.
To support long-term token value and reduce circulating supply, CEO Oliver Feldmeier committed to personally funding a $500,000 USDT buyback of $GAIN over three months. Additionally, GriffinAI will execute a $2 million USDT buyback over the next 12 months. All repurchased tokens will be permanently burned to create deflationary pressure.
The team reported the incident to law enforcement to pursue the attacker and potentially recover the stolen funds, though no recoveries have been reported as of now.
The GriffinAI exploit serves as a stark reminder of the risks associated with cross-chain bridges like LayerZero, particularly when admin privileges are compromised. Projects must prioritize robust key management, thorough audits, and secure peer configurations to prevent similar incidents. This attack not only caused immediate financial damage but also eroded trust in emerging Web3 AI initiatives, emphasizing the need for enhanced security practices in the DeFi ecosystem.
Contents
Get updates on our community, partners, events, and everything happening across the ecosystem — delivered straight to your inbox.
Subscribe Now!
Office 104/105 Level 1, Emaar Square, Building 4 Sheikh Mohammed Bin Rashid Boulevard Downtown Dubai, United Arab Emirates P.O box: 416654
Privacy PolicyAll Rights Reserved. © 2025. QuillAudits - LLC
Office 104/105 Level 1, Emaar Square, Building 4 Sheikh Mohammed Bin Rashid Boulevard Downtown Dubai, United Arab Emirates P.O box: 416654
hello@quillaudits.comAll Rights Reserved. © 2025. QuillAudits - LLC
Privacy Policy