The post Venus Protocol Security Strength appeared on BitcoinEthereumNews.com. Reliable lending protocols are the backbone of DeFi. Many users rely on them to deposit significant amounts of capital, enabling borrowing, lending, and participation in a variety of decentralized finance strategies. Venus Protocol, one of the leading multichain lending platforms with more than $2.6 billion in TVL, recently demonstrated both its resilience and strong onchain security framework. On September 2, 2025, a Venus user became the target of a phishing attack that drained approximately $13M in funds. The suspicious activity immediately triggered a security alert, prompting the protocol to pause operations as a precaution. Within just 13 hours, the stolen assets were successfully recovered, and Venus Protocol returned to full functionality without further disruption. Timeline: From Detection to Recovery The victim reported that attackers used a malicious Zoom client to gain control of their machine. Using this access, they tricked the user into approving them as a valid Venus delegate, allowing the attacker to borrow and redeem on the user’s behalf and drain approximately $13M across multiple assets, including USDT, wBETH, FDUSD, USDC, and BTCB Venus responded swiftly—pausing the protocol shortly after detecting the suspicious transaction, ensuring the attacker could not access or transfer the stolen assets. Following security advice, the Venus team also paused the EXIT_MARKET action across all markets, preventing the attacker from disabling some of the stolen assets that were acting as collateral. Coordinating with security partners and deploying a custom liquidator, the team successfully recovered all stolen funds, restoring the protocol to full operation safely and securely. Key Details Funds Drained: 19.826M USDT, 3,744 wBETH, 311,571 FDUSD, ~15,000 USDC, and a small amount of ETH Victim wallet address: 0x563617b87d8bb3f2f14bb5a581f2e19f80b52008 Attacker wallet address: 0x7fd8f825e905c771285f510d8e428a2b69a6202a Receiver wallet address (recovered funds and debt from attacker): 0xC753FB97Ed8E1c6081699570b57115D28F2232FA Custom Liquidator: 0xe011d57ecf48c448a7601eae30e6bf2d22886c50 Type of Attack: Phishing via malicious Zoom client granting delegated… The post Venus Protocol Security Strength appeared on BitcoinEthereumNews.com. Reliable lending protocols are the backbone of DeFi. Many users rely on them to deposit significant amounts of capital, enabling borrowing, lending, and participation in a variety of decentralized finance strategies. Venus Protocol, one of the leading multichain lending platforms with more than $2.6 billion in TVL, recently demonstrated both its resilience and strong onchain security framework. On September 2, 2025, a Venus user became the target of a phishing attack that drained approximately $13M in funds. The suspicious activity immediately triggered a security alert, prompting the protocol to pause operations as a precaution. Within just 13 hours, the stolen assets were successfully recovered, and Venus Protocol returned to full functionality without further disruption. Timeline: From Detection to Recovery The victim reported that attackers used a malicious Zoom client to gain control of their machine. Using this access, they tricked the user into approving them as a valid Venus delegate, allowing the attacker to borrow and redeem on the user’s behalf and drain approximately $13M across multiple assets, including USDT, wBETH, FDUSD, USDC, and BTCB Venus responded swiftly—pausing the protocol shortly after detecting the suspicious transaction, ensuring the attacker could not access or transfer the stolen assets. Following security advice, the Venus team also paused the EXIT_MARKET action across all markets, preventing the attacker from disabling some of the stolen assets that were acting as collateral. Coordinating with security partners and deploying a custom liquidator, the team successfully recovered all stolen funds, restoring the protocol to full operation safely and securely. Key Details Funds Drained: 19.826M USDT, 3,744 wBETH, 311,571 FDUSD, ~15,000 USDC, and a small amount of ETH Victim wallet address: 0x563617b87d8bb3f2f14bb5a581f2e19f80b52008 Attacker wallet address: 0x7fd8f825e905c771285f510d8e428a2b69a6202a Receiver wallet address (recovered funds and debt from attacker): 0xC753FB97Ed8E1c6081699570b57115D28F2232FA Custom Liquidator: 0xe011d57ecf48c448a7601eae30e6bf2d22886c50 Type of Attack: Phishing via malicious Zoom client granting delegated…

Venus Protocol Security Strength

Reliable lending protocols are the backbone of DeFi. Many users rely on them to deposit significant amounts of capital, enabling borrowing, lending, and participation in a variety of decentralized finance strategies. Venus Protocol, one of the leading multichain lending platforms with more than $2.6 billion in TVL, recently demonstrated both its resilience and strong onchain security framework.

On September 2, 2025, a Venus user became the target of a phishing attack that drained approximately $13M in funds. The suspicious activity immediately triggered a security alert, prompting the protocol to pause operations as a precaution. Within just 13 hours, the stolen assets were successfully recovered, and Venus Protocol returned to full functionality without further disruption.

Timeline: From Detection to Recovery

The victim reported that attackers used a malicious Zoom client to gain control of their machine. Using this access, they tricked the user into approving them as a valid Venus delegate, allowing the attacker to borrow and redeem on the user’s behalf and drain approximately $13M across multiple assets, including USDT, wBETH, FDUSD, USDC, and BTCB

Venus responded swiftly—pausing the protocol shortly after detecting the suspicious transaction, ensuring the attacker could not access or transfer the stolen assets. Following security advice, the Venus team also paused the EXIT_MARKET action across all markets, preventing the attacker from disabling some of the stolen assets that were acting as collateral. Coordinating with security partners and deploying a custom liquidator, the team successfully recovered all stolen funds, restoring the protocol to full operation safely and securely.

Key Details

  • Funds Drained: 19.826M USDT, 3,744 wBETH, 311,571 FDUSD, ~15,000 USDC, and a small amount of ETH
  • Victim wallet address: 0x563617b87d8bb3f2f14bb5a581f2e19f80b52008
  • Attacker wallet address: 0x7fd8f825e905c771285f510d8e428a2b69a6202a
  • Receiver wallet address (recovered funds and debt from attacker): 0xC753FB97Ed8E1c6081699570b57115D28F2232FA
  • Custom Liquidator: 0xe011d57ecf48c448a7601eae30e6bf2d22886c50
  • Type of Attack: Phishing via malicious Zoom client granting delegated access
  • Full key event details: https://x.com/VenusProtocol/status/1963251755543839227

Venus Protocol: SAFU, Backed by Strong Security

Venus is a leading protocol launched in 2020, allowing users to borrow and lend in a safe, decentralized environment. With over $2.6 billion in TVL across 8 chains, Venus stands out for its strong approach to user security. Currently, it ranks among the top ten most secure lending and borrowing projects according to CertiK and has undergone multiple audits by leading security firms, including PeckShield, Quantstamp, Code4rena, and others. To stay informed about Venus and learn more about the protocol, follow the official links: 

Official Website | Venus App | Docs | X | Discord

Source: https://beincrypto.com/venus-protocol-security-strength/

Market Opportunity
Moonveil Logo
Moonveil Price(MORE)
$0.002393
$0.002393$0.002393
-0.86%
USD
Moonveil (MORE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

The post Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be appeared on BitcoinEthereumNews.com. Jordan Love and the Green Bay Packers are off to a 2-0 start. Getty Images The Green Bay Packers are, once again, one of the NFL’s better teams. The Cleveland Browns are, once again, one of the league’s doormats. It’s why unbeaten Green Bay (2-0) is a 8-point favorite at winless Cleveland (0-2) Sunday according to betmgm.com. The money line is also Green Bay -500. Most expect this to be a Packers’ rout, and it very well could be. But Green Bay knows taking anyone in this league for granted can prove costly. “I think if you look at their roster, the paper, who they have on that team, what they can do, they got a lot of talent and things can turn around quickly for them,” Packers safety Xavier McKinney said. “We just got to kind of keep that in mind and know we not just walking into something and they just going to lay down. That’s not what they going to do.” The Browns certainly haven’t laid down on defense. Far from. Cleveland is allowing an NFL-best 191.5 yards per game. The Browns gave up 141 yards to Cincinnati in Week 1, including just seven in the second half, but still lost, 17-16. Cleveland has given up an NFL-best 45.5 rushing yards per game and just 2.1 rushing yards per attempt. “The biggest thing is our defensive line is much, much improved over last year and I think we’ve got back to our personality,” defensive coordinator Jim Schwartz said recently. “When we play our best, our D-line leads us there as our engine.” The Browns rank third in the league in passing defense, allowing just 146.0 yards per game. Cleveland has also gone 30 straight games without allowing a 300-yard passer, the longest active streak in the NFL.…
Share
BitcoinEthereumNews2025/09/18 00:41
Academic Publishing and Fairness: A Game-Theoretic Model of Peer-Review Bias

Academic Publishing and Fairness: A Game-Theoretic Model of Peer-Review Bias

Exploring how biases in the peer-review system impact researchers' choices, showing how principles of fairness relate to the production of scientific knowledge based on topic importance and hardness.
Share
Hackernoon2025/09/17 23:15
The Role of Reference Points in Achieving Equilibrium Efficiency in Fair and Socially Just Economies

The Role of Reference Points in Achieving Equilibrium Efficiency in Fair and Socially Just Economies

This article explores how a simple change in the reference point can achieve a Pareto-efficient equilibrium in both free and fair economies and those with social justice.
Share
Hackernoon2025/09/17 22:30