List of Flash News about DeFi security
| Time | Details |
|---|---|
|
2025-11-03 09:59 |
BNB Chain Says No Impact from Balancer Exploit; Warns Forked Protocols to Pause — Trading Implications for BNB, BAL and BNB Chain DeFi
According to @PANewsCN, BNB Chain stated in an official X post that the recent Balancer exploit did not affect any BNB Chain projects (source: BNB Chain on X: https://x.com/BNBCHAIN/status/1985281881646969218). BNB Chain urged all forked projects to remain highly vigilant and consider pausing operations as a precaution (source: BNB Chain on X: https://x.com/BNBCHAIN/status/1985281881646969218). BNB Chain added that its team and partners are actively monitoring developments and emphasized maintaining security (source: BNB Chain on X: https://x.com/BNBCHAIN/status/1985281881646969218). For traders, this indicates no immediate direct risk to native BNB Chain protocols, but potential pauses by Balancer forks on BNB Chain could temporarily disrupt swaps, LP withdrawals, and liquidity routing, raising execution risk during any suspensions (source: BNB Chain on X: https://x.com/BNBCHAIN/status/1985281881646969218). Traders should track official updates from BNB Chain and forked protocols for changes that may influence BNB, BAL, and BNB Chain DeFi activity (source: BNB Chain on X: https://x.com/BNBCHAIN/status/1985281881646969218). |
|
2025-10-31 09:25 |
Radiant Capital Exploiter Moves 5,411.8 ETH (~$20.7M) to Tornado Cash: On-Chain Alert for Traders
According to @PeckShieldAlert, the Radiant Capital exploiter deposited 5,411.8 ETH (about $20.7 million) into Tornado Cash on Oct 31, 2025, source: PeckShieldAlert on X, Oct 31, 2025. Tornado Cash is a crypto mixer that obfuscates transaction trails and was sanctioned by the U.S. Treasury for facilitating laundering of stolen funds, which complicates tracking and recovery of proceeds from exploits, source: U.S. Treasury (OFAC) press release, Aug 8, 2022. For trading, large hacked-fund deposits into mixers are typically followed by distribution across numerous fresh addresses, making on-chain monitoring of ETH flows critical for risk management, source: Chainalysis 2023 Crypto Crime Report. |
|
2025-10-30 14:40 |
Garden Finance Exploit Tops $5.5M Across Multiple Chains; Attacker Actively Swapping to ETH — On-Chain Alert
According to @PeckShieldAlert, ZachXBT reported that Garden Finance was exploited for more than $5.5 million across multiple chains (source: @PeckShieldAlert on X; source: ZachXBT on X). @PeckShieldAlert also states the exploiter is in the process of swapping the stolen assets for ETH, confirming active on-chain conversions linked to the incident (source: @PeckShieldAlert on X). @PeckShieldAlert did not specify the affected chains or the exact assets stolen beyond the move into ETH (source: @PeckShieldAlert on X). For traders, the attacker’s ongoing swaps into ETH indicate exploit-related sell flow is currently moving through ETH pairs on-chain, allowing real‑time tracking of transaction activity during the incident window (source: @PeckShieldAlert on X). |
|
2025-10-15 16:28 |
SUI Alert: Typus Finance Reports Issues on Sui — 5 Trading Steps to Manage DeFi Risk Now
According to the source, Typus Finance stated on its official X account that issues have been reported affecting the project on Sui (source: Typus Finance on X, Oct 15, 2025). In light of the project’s notice, traders can pause new deposits or contract approvals with Typus Finance and await official updates or a post-mortem to mitigate smart contract and counterparty risk when trading SUI and interacting with Sui DeFi (source: Typus Finance on X). Participants exposed via Typus-linked vaults or LP pools on Sui can review and potentially reduce positions and use conservative slippage and collateral settings when trading SUI until the team confirms resolution (source: Typus Finance on X). |
|
2025-10-13 22:55 |
Ripple Partners With Immunefi on $200,000 XRPL Lending Protocol Attackathon to Strengthen DeFi Security for XRP
According to the source, Ripple is partnering with Immunefi to host a $200,000 attackathon focused on finding bugs in the XRP Ledger (XRPL) lending protocol, with the reward pool stated as $200,000 and the target identified as the XRPL lending protocol (source: public social media post dated Oct 13, 2025). For trading relevance, monitor official communications from Ripple and Immunefi for the program’s scope, rules, duration, and any disclosed findings, as these announcements set headline timing that can influence XRP-focused sentiment and positioning (source: same post and forthcoming organizer updates). |
|
2025-10-13 20:52 |
Ripple Offers $200K Bounty to 'Attack' XRP Ledger (XRPL) Lending Protocol: Key Update for XRP Traders
According to the source, Ripple is offering a $200,000 reward to 'attack' an XRP Ledger (XRPL) lending protocol (source: the provided social media post dated Oct 13, 2025). Traders focused on XRP should note that the bounty centers on an XRPL lending protocol and specifies a $200,000 payout (source: the provided social media post dated Oct 13, 2025). |
|
2025-09-30 20:00 |
Pendle (PENDLE) Clarifies No Hack: Single Wallet Compromised as Exploiter Minted and Sold PT/YT — Trading Key Facts
According to the source, Pendle stated that no protocol hack occurred; instead, a single user wallet was compromised and the attacker minted and sold PT and YT on Sep 30, 2025 (source: Pendle public statement on X, Sep 30, 2025). For traders, the incident is characterized as wallet-level rather than a protocol breach, with activity centered on PT/YT issuance and sell pressure (source: Pendle public statement on X, Sep 30, 2025). |
|
2025-09-24 23:04 |
Crypto Social Engineering Scams Alert: Phantom Lists 3 High-Risk Actions for Traders - Links, Keys, Approvals
According to @phantom, many crypto scams are not code-based but social engineering, where scammers build trust and then induce victims to click links, share keys, or approve transactions that grant them access. Source: Phantom on X, Sep 24, 2025. This creates direct exposure during link interactions, private key handling, and on-chain approval steps, with potential for wallet access and loss of funds if manipulated. Source: Phantom on X, Sep 24, 2025. |
|
2025-09-12 07:52 |
THORChain (RUNE) Not Hacked: PeckShield Confirms User Wallet Exploit Only — Key Update for Traders
According to @PeckShieldAlert, the incident was a compromise of a user's personal wallet and is not related to the THORChain protocol, indicating no confirmed protocol-level exploit on THORChain at this time (source: x.com/PeckShieldAlert/status/1966409664008233379). For trading, this clarification means the event should be treated as user-side security risk rather than a protocol failure when assessing RUNE exposure and THORChain liquidity risk (source: x.com/PeckShieldAlert/status/1966409664008233379; reference: x.com/PeckShieldAlert/status/1966399712741016051). |
|
2025-09-02 11:44 |
PeckShieldAlert: Venus Protocol user phishing loss corrected to 13.5M dollars — updated figure clarifies user-level incident
According to @PeckShieldAlert, the loss for the phished Venus Protocol user has been corrected to approximately 13.5 million dollars after initial estimates were overstated by not excluding the debt position, and the update specifies this was a user-level phishing incident rather than a protocol exploit (source: @PeckShieldAlert, Sep 2, 2025). |
|
2025-09-02 09:33 |
PeckShieldAlert: Venus Protocol User Drained of About $27M via Phishing Token Approval to 0x7fd8...202a — Key Trading Watchpoints
According to @PeckShieldAlert, a Venus Protocol user lost about $27 million after approving a malicious transaction that granted token spending rights to attacker address 0x7fd8...202a, enabling asset transfers; source: @PeckShieldAlert. Given the user-targeted phishing vector and token-approval mechanism described, traders with exposure to Venus-related markets can prioritize allowance checks and monitor addresses interacting with 0x7fd8...202a for abnormal flows to gauge short-term risk; source: @PeckShieldAlert. |
|
2025-08-25 09:14 |
Paradex Network Announces Up to $500,000 Immunefi Bug Bounty to Strengthen Platform Security for Crypto Traders
According to @tradeparadex, Paradex Network is increasing its bug bounty program to offer rewards up to $500,000 in a move to enhance platform security for users. Source: Paradex Network on X, Aug 25, 2025. The new phase is being executed in collaboration with Immunefi, with more information and participation instructions provided in the announcement link. Source: Paradex Network on X, Aug 25, 2025. The initiative explicitly aims to safeguard the platform and reward security researchers, signaling a heightened focus on risk reduction relevant to active traders. Source: Paradex Network on X, Aug 25, 2025. |
|
2025-07-15 05:47 |
ArcadiaFi Exploited for $2.5 Million; Attacker Bridges 840 ETH from Base to Ethereum
According to PeckShieldAlert, the DeFi protocol ArcadiaFi has suffered an exploit resulting in losses of approximately $2.5 million. The security firm reported that the attacker converted the stolen assets into about 840 ETH. Following the swap, the exploiter bridged these funds from the Base network to the Ethereum mainnet, as detailed in the alert. |
|
2025-07-12 00:34 |
GMX Project Sells 10,000 ETH for $29.6M USDT Following Hacker's Asset Return
According to EmberCN, the GMX project team sold 10,000 ETH for 29.597 million USDT at an average price of $2,959 per coin. This action followed a hacker's return of assets, which included the 10,000 ETH (valued at $30 million) and 10.495 million FRAX stablecoins. The source suggests that converting the returned Ethereum into the stablecoin USDT is likely a strategic move to prepare for refunding assets to the affected users, as monitored via the GMX Security Committee's multi-signature address. |
|
2025-07-11 10:52 |
GMX Hacker Returns $40 Million in ETH and FRAX, Potentially Keeps $5 Million White Hat Bounty
According to @EmberCN, the hacker involved with the GMX protocol has reportedly returned assets totaling approximately $40 million. The returned funds consist of 10.495 million FRAX and 10,000 ETH, the latter valued at around $30 million, as stated in the analysis. The report from @EmberCN further notes that the hacker's wallet still contains 1,700 ETH, worth about $5 million. This amount corresponds to the $5 million white-hat bounty previously offered by the GMX project, implying the hacker may have kept it as a reward. This resolution could positively influence trader sentiment and the stability of the GMX token by restoring funds and demonstrating a conclusion to the security incident. |
|
2025-07-11 10:22 |
GMX Exploiter Returns Another $3M in ETH, Boosting Protocol's Security Fund to $40.5M
According to @PeckShieldAlert, the individual who previously exploited the GMX protocol has returned an additional 1,000 ETH, valued at approximately $3 million, to the GMX Security Committee's multisig address. This latest return brings the total value of assets held in the security wallet to $40.5 million. The wallet's holdings now include around 10,000 ETH and 10.5 million FRAX. For traders, the ongoing return of exploited funds is a significant positive indicator for the GMX protocol's integrity and financial stability, potentially strengthening investor confidence in the GMX token. |
|
2025-07-11 10:16 |
GMX Exploiter Returns $37.5M in ETH and FRAX, Boosting Protocol Security
According to PeckShieldAlert, an exploiter has returned a significant amount of funds to the GMX protocol, totaling approximately $37.5 million. The returned assets include around 9,000 Ethereum (ETH) and 10.5 million FRAX stablecoins, which were transferred to the GMX Security Committee Multisig address. This fund recovery is a positive development for the GMX ecosystem, potentially restoring investor confidence and positively impacting the GMX token's price by mitigating the financial damage from the exploit. |
|
2025-07-11 10:04 |
GMX Exploiter Returns Second Batch of 3,000 ETH Valued at $9 Million
According to @PeckShieldAlert, the individual who exploited the GMX protocol has returned a second batch of funds. The transaction involved approximately 3,000 ETH, with an estimated value of $9 million, sent to the GMX Security Committee's multisig address. This fund recovery is a significant positive development for the GMX protocol's security and financial stability, potentially reducing selling pressure on the GMX token and restoring investor confidence. |
|
2025-07-11 09:39 |
GMX Hacker Returns 3,000 ETH to Protocol's Security Wallet in Major Development
According to @EmberCN, the hacker involved in the GMX exploit has returned 3,000 Ethereum (ETH) to the GMX team's Security Committee multi-signature address. This significant return of funds follows a previous transaction where the hacker also returned stolen FRAX tokens. This development is a positive signal for the GMX protocol and its token holders, potentially boosting market confidence and indicating a partial recovery of assets from the security breach. |
|
2025-07-11 09:35 |
GMX Exploiter Returns 3,000 ETH Worth $9 Million, Bolstering Investor Confidence
According to @PeckShieldAlert, an exploiter has returned approximately 3,000 ETH, valued at around $9 million, to the GMX protocol's Deployer Gnosis Safe Proxy. For traders, this return of stolen funds is a significant positive development that could restore investor confidence in the GMX platform's security and potentially lead to a bullish sentiment for the GMX token. The recovery of assets following an exploit often mitigates the initial negative price impact and is viewed favorably by the market. |