Balancer was exploited on multiple chains, through interactions with smart contracts. The decentralized market lost $116M, mostly in wrapped ETH.Balancer was exploited on multiple chains, through interactions with smart contracts. The decentralized market lost $116M, mostly in wrapped ETH.

Balancer suffers $116M exploit targeting wrapped ETH

2025/11/03 18:21

Balancer, one of the oldest DeFi protocols, has been exploited on multiple chains. Within an hour, the estimated losses expanded from $70M to over $116M. 

Balancer was the target of the most recent attack against DeFi, targeting wrapped ETH and other assets on multiple chains. The initial estimates were for losses of $70M, but the attack was ongoing, quickly reaching $116M. 

The Balancer attack arrived after several relatively quiet months, when hackers selected more obscure protocols. Balancer may line up among the biggest DeFi hacks for 2025. Soon after the exploit, a whale dormant for over three years moved in to withdraw the entire stake from Balancer. 

As DeFi protocols remain more popular for passive yield, they also become more attractive for hackers. 

Balancer was exploited for $91M on the Ethereum L1 chain, though assets were also taken on Arbitrum, Base, and Optimism. Soon after the initial attack, the hacker started splitting the assets to new wallets.

Balancer exploited through ongoing smart contract interactions

The current Balancer hack may be due to a flawed smart contract, which allowed the attacker to mint unauthorized tokens. Some of the token interactions included functions like ‘approve infinite wstETH’. 

Balancer hit with $116M drain, targeting wrapped ETH.Balancer vaults were attacked with calls to send unauthorized tokens. | Source: DeBank.

The Balancer attack wallet was identified, currently holding multiple versions of wrapped ETH on several chains. The coins have not been unwrapped or traded. If the hacker decides to swap some of the assets, this may further exacerbate problems with other DeFi protocols, or crash the price of ETH. 

Following the hack, ETH traded at $3,735.04. ETH remains a frequently attacked asset, due to the ease of swapping, trading, or mixing. 

The Balancer exploit arrived just days after a smaller theft of $5.5M from the Garden Finance bridge. As Cryptopolitan reported, in the whole month of September, 20 thefts led to a total loss of $127M

Balancer V2 pools were affected

Following the attack, Balancer reacted on Discord, stating that mostly V2 pools were affected. Balancer V2 carries relatively limited volumes, though the DEX reported an anomaly of $26B traded in the past 24 hours, based on CoinGecko data. Balancer announced it is working with security experts on the next step. 

According to the exchange team, V3 remains unaffected, though there are conflicting data that the hacker attempted to break multiple vaults. Currently, V2 is still leading in terms of volumes, though V3 attempts to become the main trading venue with growing stablecoin activity. 

Balancer activity has remained relatively low compared to newer DEXs and DeFi platforms. The chain locked in $678M, down from a peak $3.11B in 2022. The platform attempted to renew its influence during the latest bull cycle. 

The hack hardly affected the BAL native token, which is traded on low volumes and has lost over 99% of its value since launch. 

Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO

Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO

The post Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO appeared on BitcoinEthereumNews.com. Aave DAO is gearing up for a significant overhaul by shutting down over 50% of underperforming L2 instances. It is also restructuring its governance framework and deploying over $100 million to boost GHO. This could be a pivotal moment that propels Aave back to the forefront of on-chain lending or sparks unprecedented controversy within the DeFi community. Sponsored Sponsored ACI Proposes Shutting Down 50% of L2s The “State of the Union” report by the Aave Chan Initiative (ACI) paints a candid picture. After a turbulent period in the DeFi market and internal challenges, Aave (AAVE) now leads in key metrics: TVL, revenue, market share, and borrowing volume. Aave’s annual revenue of $130 million surpasses the combined cash reserves of its competitors. Tokenomics improvements and the AAVE token buyback program have also contributed to the ecosystem’s growth. Aave global metrics. Source: Aave However, the ACI’s report also highlights several pain points. First, regarding the Layer-2 (L2) strategy. While Aave’s L2 strategy was once a key driver of success, it is no longer fit for purpose. Over half of Aave’s instances on L2s and alt-L1s are not economically viable. Based on year-to-date data, over 86.6% of Aave’s revenue comes from the mainnet, indicating that everything else is a side quest. On this basis, ACI proposes closing underperforming networks. The DAO should invest in key networks with significant differentiators. Second, ACI is pushing for a complete overhaul of the “friendly fork” framework, as most have been unimpressive regarding TVL and revenue. In some cases, attackers have exploited them to Aave’s detriment, as seen with Spark. Sponsored Sponsored “The friendly fork model had a good intention but bad execution where the DAO was too friendly towards these forks, allowing the DAO only little upside,” the report states. Third, the instance model, once a smart…
Share
BitcoinEthereumNews2025/09/18 02:28
Shytoshi Kusama Addresses $2.4 Million Shibarium Bridge Exploit

Shytoshi Kusama Addresses $2.4 Million Shibarium Bridge Exploit

The post Shytoshi Kusama Addresses $2.4 Million Shibarium Bridge Exploit appeared on BitcoinEthereumNews.com. The lead developer of Shiba Inu, Shytoshi Kusama, has publicly addressed the Shibarium bridge exploit that occurred recently, draining $2.4 million from the network. After days of speculation about his involvement in managing the crisis, the project leader broke his silence. Kusama emphasized that a special “war room” has been set up to restore stolen finances and enhance network security. The statement is his first official words since the bridge compromise occurred. “Although I am focusing on AI initiatives to benefit all our tokens, I remain with the developers and leadership in the war room,” Kusama posted on social media platform X. He dismissed claims that he had distanced himself from the project as “utterly preposterous.” The developer said that the reason behind his silence at first was strategic. Before he could make any statements publicly, he must have taken time to evaluate what he termed a complex and deep situation properly. Kusama also vowed to provide further updates in the official Shiba Inu channels as the team comes up with long-term solutions. As highlighted in our previous article, targeted Shibarium’s bridge infrastructure through a sophisticated attack vector. Hackers gained unauthorized access to validator signing keys, compromising the network’s security framework. The hackers executed a flash loan to acquire 4.6 million BONE ShibaSwap tokens. The validator power on the network was majority held by them after this purchase. They were able to transfer assets out of Shibarium with this control. The response of Shibarium developers was timely to limit the breach. They instantly halted all validator functions in order to avoid additional exploitation. The team proceeded to deposit the assets under staking in a multisig hardware wallet that is secure. External security companies were involved in the investigation effort. Hexens, Seal 911, and PeckShield are collaborating with internal developers to…
Share
BitcoinEthereumNews2025/09/18 03:46