Chaincatcher news: According to data disclosed by Kevin Peng, an analyst at Block Research, up to now, 190 Ethereum addresses have approved the SuShiSwap problematic contract. Brad Kay, another analyst at the agency, said that the attacker used the ‘yoink’ function. Since the attack vector involves an error in the Sushi Swap router contract approval mechanism, unauthorized entities can obtain tokens without proper approval from token owners. (Source link)