CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

Cryptopolitan 2025-06-26 18:55:42

Hacker exploits flaw in Resupply DeFi protocol to steal $9.6 million

A hacker identified a flaw in the Resupply decentralized finance (DeFi) protocol early Thursday that helped them siphon off nearly $9.6 million in digital assets. The attacker reportedly manipulated token prices through a smart contract vulnerability. According to blockchain security analysts, Resupply, a DeFi stablecoin platform integrated with Convex Finance and Yearn Finance, was the main target of the exploit. The attacker used an elaborate price manipulation tactic on cvcrvUSD, a token tied to Convex, to deceive the system and obtain a loan using virtually worthless collateral. Smart contract bug leads to zero exchange rate The main point of the breach was found at the ResupplyPair contract, deployed Thursday at Ethereum address “ 0x6e…6bd6″ . The contract used the price of cvcrvUSD to calculate an internal exchange rate for collateralized lending. Yet another lending protocol exploited via exchange rate manipulation on low-liquidity—even empty—markets! Specifically, attackers artificially inflated #cvcrvUSD 's share price through donations. @ResupplyFi 's ResupplyPair contract ( https://t.co/yo2N5lScHi , created ~2h ago) uses… https://t.co/MelEYFLr98 pic.twitter.com/2qXC9IiREL — BlockSec Phalcon (@Phalcon_xyz) June 26, 2025 The attacker used this dependency by artificially inflating the cvcrvUSD token’s price through coordinated donation transactions. When the token’s value surged, the price input in the ResupplyPair contract soared. However, a flaw in the protocol’s code, specifically the use of floor division, caused the exchange rate to round down to zero once the price moved past a measured threshold. With the exchange rate set to zero, the attacker was able to borrow a massive amount of Resupply’s native stablecoin, reUSD, using only 1 wei of cvcrvUSD as collateral. The platform’s insolvency checks, which rely on this exchange rate, were effectively bypassed. “ The attacker manipulated token prices, triggering a bug (zero exchange rate) in Resupply’s smart contract, letting them borrow a ton of money for almost nothing ,” explained Hakan Unal, senior security operations lead at blockchain risk firm Cyvers. Tornado Cash used for transaction anonymity Blockchain activity shows the hacker initially funded their wallet through Tornado Cash, a decentralized privacy protocol mixer that criminals use to hide the origin of funds. The entry point of the attack was a transaction on Cow Swap involving 2 ETH, according to an analysis by blockchain security firm PeckShield. After the breach, they liquidated the stolen assets by converting reUSD to stablecoins and Ethereum through Curve and Uniswap, both decentralized exchanges. The $9.6 million in profit was split across two separate Ethereum addresses. The attacker used both USDC and wrapped Ethereum (wETH) to store the final proceeds. Later in the day, Resupply confirmed the breach and admitted that the exploit had affected its wstUSR market. The platform immediately paused all contracts to prevent further damage. “ Users should avoid reUSD vaults and withdraw funds if possible ,” Unal advised investors using the protocol. Crypto-related hacks in 2025 become rampant The Resupply breach adds to a string of high-value hacks targeting both decentralized finance and centralized platforms. Blockchain forensic firm Chainalysis reports that over $2.3 billion has already been stolen in crypto hacks since the start of 2025, a figure that outpaces last year’s total by midyear. Just days before the Resupply incident, on June 18, Iran-based cryptocurrency exchange Nobitex suffered a devastating breach. Hackers made off with more than $90 million in digital assets from several blockchains, including Bitcoin, Ethereum, Dogecoin, Ripple, Solana, Tron, and Ton. Prior investigations have linked wallets on Nobitex to actors affiliated with the Islamic Revolutionary Guard Corps (IRGC), and networks tied to Houthi rebels in Yemen and Hamas operatives. The National Bureau for Counter Terror Financing (NBCTF) of Israel has identified the platform as a conduit for funds to several sanctioned entities. These include the pro-Hamas media outlet Gaza Now, an alleged propaganda arm of al-Qaeda, and sanctioned Russian cryptocurrency exchanges Garantex and Bitpapa. Cryptopolitan Academy: Tired of market swings? Learn how DeFi can help you build steady passive income. Register Now

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.