Yearn Finance has published a detailed post-mortem on last week’s yETH exploit, explaining how a numerical flaw in one of its older stableswap pools let an attacker mint an almost unlimited amount of LP tokens and steal about $9M in assets. The DeFi platform said it has already recovered part of the stolen funds. In the report, Yearn said the attack hit the yETH weighted stableswap pool at block 23,914,086 on November 30, 2025.  DISCOVER: Top 20 Crypto to Buy in 2025 Which Yearn Products Were Affected and Which Stayed Safe? The breach followed what the team described as “a complex sequence of operations” that pushed the pool’s internal solver into a divergent state and then triggered an arithmetic underflow. Yearn noted that its v2 and v3 vaults, along with the rest of its products, “were not affected.” The impact stayed limited to yETH and the systems tied to it. The attacker targeted a custom stableswap pool that held several liquid staking tokens: apxETH, sfrxETH, wstETH, cbETH, rETH, ETHx, mETH, and wOETH, as well as a yETH/WETH Curve pool. According to Yearn’s asset snapshot, the pools held a mix of LSTs and 298.35 WETH before the exploit occurred. Yearn’s post-mortem breaks the attack into three clear steps. In the first stage, the attacker used a series of imbalanced add_liquidity deposits that pushed the pool’s fixed-point solver into a state it wasn’t built to manage. That move caused the internal product term, Π, to fall to zero. Once that happened, the weighted-stableswap invariant failed, allowing the attacker to mint far more yETH LP tokens than the value they had actually deposited. With those inflated LP tokens in hand, the attacker moved to the next phase.  They repeatedly called remove_liquidity and related functions, pulling out almost all of the LST liquidity. Most of the loss shifted onto protocol-owned liquidity inside the staking contract.  DISCOVER: 9+ Best High-Risk, High-Reward Crypto to Buy in 2025 What Funds Has Yearn Recovered So Far, And Who Will Receive Them? According to Yearn, this sequence drove the pool’s internal supply to zero even though ERC-20 balances still showed tokens in the contract. In the final step, the attacker slipped into a “bootstrap” initialization path that was only intended for the pool’s first launch.  By sending a crafted dust-level configuration that broke a key domain rule, they triggered an unsafe subtraction. That underflow created a massive batch of new yETH LP tokens and completed the exploit. Yearn said the underflow was so severe that it created what the team called an “infinite-mint.” The attacker used this flaw to drain the yETH/ETH Curve pool. The project said it has recovered 857.49 pxETH so far with help from the Plume and Dinero teams. A recovery transaction took place on Dec. 1.  Yearn plans to return the recovered assets to yETH depositors on a pro-rata basis, using balances from right before the exploit. Any further recoveries, whether from cooperation by the attacker or from new tracing efforts, will also go to depositors. The timeline released by Yearn shows that a war room was formed about 20 minutes after the breach.  The SEAL 911 response group joined soon after. Investigators say the attacker sent 1,000 ETH to Tornado Cash later that night, and moved the remaining funds through the mixer on Dec. 5. Earlier reporting from The Block said roughly $3M in ETH moved through Tornado Cash in the hours after the attack. The post-mortem also reminds users that YIP-72 governs yETH. It points to the product’s “Use at Own Risk” clause, which states that Yearn contributors and YFI governance are not responsible for covering losses.  The report says any recovered funds will go back to affected users. DISCOVER: 15+ Upcoming Coinbase Listings to Watch in 2025 The post Everything You Need to Know About Yearn Finance Exploit appeared first on 99Bitcoins.Yearn Finance has published a detailed post-mortem on last week’s yETH exploit, explaining how a numerical flaw in one of its older stableswap pools let an attacker mint an almost unlimited amount of LP tokens and steal about $9M in assets. The DeFi platform said it has already recovered part of the stolen funds. In the report, Yearn said the attack hit the yETH weighted stableswap pool at block 23,914,086 on November 30, 2025.  DISCOVER: Top 20 Crypto to Buy in 2025 Which Yearn Products Were Affected and Which Stayed Safe? The breach followed what the team described as “a complex sequence of operations” that pushed the pool’s internal solver into a divergent state and then triggered an arithmetic underflow. Yearn noted that its v2 and v3 vaults, along with the rest of its products, “were not affected.” The impact stayed limited to yETH and the systems tied to it. The attacker targeted a custom stableswap pool that held several liquid staking tokens: apxETH, sfrxETH, wstETH, cbETH, rETH, ETHx, mETH, and wOETH, as well as a yETH/WETH Curve pool. According to Yearn’s asset snapshot, the pools held a mix of LSTs and 298.35 WETH before the exploit occurred. Yearn’s post-mortem breaks the attack into three clear steps. In the first stage, the attacker used a series of imbalanced add_liquidity deposits that pushed the pool’s fixed-point solver into a state it wasn’t built to manage. That move caused the internal product term, Π, to fall to zero. Once that happened, the weighted-stableswap invariant failed, allowing the attacker to mint far more yETH LP tokens than the value they had actually deposited. With those inflated LP tokens in hand, the attacker moved to the next phase.  They repeatedly called remove_liquidity and related functions, pulling out almost all of the LST liquidity. Most of the loss shifted onto protocol-owned liquidity inside the staking contract.  DISCOVER: 9+ Best High-Risk, High-Reward Crypto to Buy in 2025 What Funds Has Yearn Recovered So Far, And Who Will Receive Them? According to Yearn, this sequence drove the pool’s internal supply to zero even though ERC-20 balances still showed tokens in the contract. In the final step, the attacker slipped into a “bootstrap” initialization path that was only intended for the pool’s first launch.  By sending a crafted dust-level configuration that broke a key domain rule, they triggered an unsafe subtraction. That underflow created a massive batch of new yETH LP tokens and completed the exploit. Yearn said the underflow was so severe that it created what the team called an “infinite-mint.” The attacker used this flaw to drain the yETH/ETH Curve pool. The project said it has recovered 857.49 pxETH so far with help from the Plume and Dinero teams. A recovery transaction took place on Dec. 1.  Yearn plans to return the recovered assets to yETH depositors on a pro-rata basis, using balances from right before the exploit. Any further recoveries, whether from cooperation by the attacker or from new tracing efforts, will also go to depositors. The timeline released by Yearn shows that a war room was formed about 20 minutes after the breach.  The SEAL 911 response group joined soon after. Investigators say the attacker sent 1,000 ETH to Tornado Cash later that night, and moved the remaining funds through the mixer on Dec. 5. Earlier reporting from The Block said roughly $3M in ETH moved through Tornado Cash in the hours after the attack. The post-mortem also reminds users that YIP-72 governs yETH. It points to the product’s “Use at Own Risk” clause, which states that Yearn contributors and YFI governance are not responsible for covering losses.  The report says any recovered funds will go back to affected users. DISCOVER: 15+ Upcoming Coinbase Listings to Watch in 2025 The post Everything You Need to Know About Yearn Finance Exploit appeared first on 99Bitcoins.

Everything You Need to Know About Yearn Finance Exploit

2025/12/09 11:45

Yearn Finance has published a detailed post-mortem on last week’s yETH exploit, explaining how a numerical flaw in one of its older stableswap pools let an attacker mint an almost unlimited amount of LP tokens and steal about $9M in assets.

The DeFi platform said it has already recovered part of the stolen funds.

In the report, Yearn said the attack hit the yETH weighted stableswap pool at block 23,914,086 on November 30, 2025. 

DISCOVER: Top 20 Crypto to Buy in 2025

Which Yearn Products Were Affected and Which Stayed Safe?

The breach followed what the team described as “a complex sequence of operations” that pushed the pool’s internal solver into a divergent state and then triggered an arithmetic underflow.

Yearn noted that its v2 and v3 vaults, along with the rest of its products, “were not affected.” The impact stayed limited to yETH and the systems tied to it.

The attacker targeted a custom stableswap pool that held several liquid staking tokens: apxETH, sfrxETH, wstETH, cbETH, rETH, ETHx, mETH, and wOETH, as well as a yETH/WETH Curve pool.

According to Yearn’s asset snapshot, the pools held a mix of LSTs and 298.35 WETH before the exploit occurred.

Yearn’s post-mortem breaks the attack into three clear steps.

In the first stage, the attacker used a series of imbalanced add_liquidity deposits that pushed the pool’s fixed-point solver into a state it wasn’t built to manage.

That move caused the internal product term, Π, to fall to zero. Once that happened, the weighted-stableswap invariant failed, allowing the attacker to mint far more yETH LP tokens than the value they had actually deposited.

With those inflated LP tokens in hand, the attacker moved to the next phase. 

They repeatedly called remove_liquidity and related functions, pulling out almost all of the LST liquidity. Most of the loss shifted onto protocol-owned liquidity inside the staking contract. 

DISCOVER: 9+ Best High-Risk, High-Reward Crypto to Buy in 2025

What Funds Has Yearn Recovered So Far, And Who Will Receive Them?

According to Yearn, this sequence drove the pool’s internal supply to zero even though ERC-20 balances still showed tokens in the contract.

In the final step, the attacker slipped into a “bootstrap” initialization path that was only intended for the pool’s first launch. 

By sending a crafted dust-level configuration that broke a key domain rule, they triggered an unsafe subtraction. That underflow created a massive batch of new yETH LP tokens and completed the exploit.

Yearn said the underflow was so severe that it created what the team called an “infinite-mint.” The attacker used this flaw to drain the yETH/ETH Curve pool.

The project said it has recovered 857.49 pxETH so far with help from the Plume and Dinero teams. A recovery transaction took place on Dec. 1. 

Yearn plans to return the recovered assets to yETH depositors on a pro-rata basis, using balances from right before the exploit. Any further recoveries, whether from cooperation by the attacker or from new tracing efforts, will also go to depositors. The timeline released by Yearn shows that a war room was formed about 20 minutes after the breach. 

The SEAL 911 response group joined soon after. Investigators say the attacker sent 1,000 ETH to Tornado Cash later that night, and moved the remaining funds through the mixer on Dec. 5.

Earlier reporting from The Block said roughly $3M in ETH moved through Tornado Cash in the hours after the attack.

The post-mortem also reminds users that YIP-72 governs yETH. It points to the product’s “Use at Own Risk” clause, which states that Yearn contributors and YFI governance are not responsible for covering losses. 

The report says any recovered funds will go back to affected users.

DISCOVER: 15+ Upcoming Coinbase Listings to Watch in 2025

The post Everything You Need to Know About Yearn Finance Exploit appeared first on 99Bitcoins.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

“Bitcoin After Dark” ETF targets gains while the world sleeps

“Bitcoin After Dark” ETF targets gains while the world sleeps

The post “Bitcoin After Dark” ETF targets gains while the world sleeps appeared on BitcoinEthereumNews.com. A proposed exchange-traded fund is built to chase Bitcoin’s price action while the U.S. market is shut on Wall Street. The product is named the Nicholas Bitcoin and Treasuries AfterDark ETF, according to a filing dated December 9 was sent to the Securities and Exchange Commission. The fund opens Bitcoin-linked trades “after the U.S. financial markets close” and exits those positions “shortly after the next day’s open.” Trading is locked into the overnight window, and of course the fund will not hold Bitcoin directly. At least 80% of assets would be used on Bitcoin futures, exchange-traded products, other Bitcoin ETFs, and options tied to those ETFs and ETPs. The rest can sit in Treasuries. The filing said that the goal is to use price action that forms when the equity market is offline. Exposure stays inside listed products only. No spot tokens, no on-chain custody, and all positions reset each morning after the open. After-hours trading drives ETF flows Bespoke Investment Group tracked a test using the iShares Bitcoin Trust ETF (IBIT), and reported that “buying at the U.S. market close and selling at the next open since January 2024 produced a 222% gain.” The same test flipped to daytime only showed “a 40.5% loss from buying at the open and selling at the close.” That gap is the return spread the AfterDark ETF is built to target. Source: Bespoke Bitcoin last traded at $92,320, down nearly 1% on the day, down about 12% over the past month, and little changed since the start of the year. ETF filings across crypto keep expanding. Products tied to Aptos, Sui, Bonk, and Dogecoin are now in the pipeline. The pace picked up after President Donald Trump pushed for softer rules at the SEC and the Commodity Futures Trading Commission. After that push,…
Share
BitcoinEthereumNews2025/12/11 07:46
XRP Price Prediction: $2.35 Target Within 4 Weeks Despite Near-Term Consolidation

XRP Price Prediction: $2.35 Target Within 4 Weeks Despite Near-Term Consolidation

The post XRP Price Prediction: $2.35 Target Within 4 Weeks Despite Near-Term Consolidation appeared on BitcoinEthereumNews.com. Jessie A Ellis Dec 10, 2025 10:59 XRP price prediction points to $2.35 target by January 2025, though immediate consolidation around $2.10 pivot expected before breakout above $2.29 resistance. With XRP trading at $2.07 and showing mixed technical signals, this comprehensive Ripple forecast examines the convergence of analyst predictions and technical indicators to determine whether the cryptocurrency is positioned for a meaningful breakout or further consolidation. XRP Price Prediction Summary • XRP short-term target (1 week): $2.20 (+6.3%) – Testing immediate resistance at $2.29 • Ripple medium-term forecast (1 month): $2.25-$2.40 range – Consensus aligns with technical breakout levels • Key level to break for bullish continuation: $2.29 immediate resistance, then $2.70 strong resistance • Critical support if bearish: $2.00 psychological level, with $1.82 as strong support floor Recent Ripple Price Predictions from Analysts The latest XRP price prediction consensus from December 9th reveals cautious optimism among major analysts. Changelly’s bearish short-term outlook targets $2.09, citing weakening moving average trends, while LiteFinance projects a broader $2.00-$2.35 range over 12 months based on the current descending channel pattern. BTCC’s Ripple forecast offers the most bullish near-term view with a $2.20-$2.70 target range, assuming stable market conditions. This aligns closely with our technical analysis showing strong resistance at $2.70. The most intriguing long-term prediction comes from InvestingHaven, projecting $2.12-$4.48 for 2026, contingent on institutional adoption acceleration. The convergence around $2.20-$2.35 across multiple forecasts suggests this represents a realistic XRP price target for the coming month, supported by technical levels rather than speculative positioning. XRP Technical Analysis: Setting Up for Measured Breakout Current Ripple technical analysis reveals a cryptocurrency in consolidation mode, with the RSI at 44.24 indicating neither oversold nor overbought conditions. The MACD histogram’s positive 0.0057 reading suggests early bullish momentum is building,…
Share
BitcoinEthereumNews2025/12/11 08:02