Original title: "Established DeFi Platform Falls: Balancer V2 Contract Vulnerability Leads to the Theft of Over $110 Million in Assets" Original author: Wenser, Odaily Planet Daily On November 3rd, it was reported that Balancer, a long-established DeFi protocol, had suffered a theft of over $70 million in assets. This news was subsequently confirmed by multiple sources, and the amount of stolen funds continued to rise. As of this writing, the amount of stolen assets from Balancer has increased to over $116 million. Odaily will provide a brief analysis of this matter in this article. Details of the Balancer theft: Losses exceeded $116 million, primarily due to a vulnerability in the v2 pool smart contract. According to on-chain information, the Balancer attackers have stolen over $116 million, primarily in the form of WETH, wstETH, osETH, frxETH, rsETH, and rETH, distributed across multiple chains including ETH, Base, and Sonic. • Assets stolen from the Ethereum blockchain: approximately $100 million; • Nearly $8 million in assets stolen from the Arbitrum blockchain; • Stolen assets on the Base blockchain: nearly $3.95 million; • Stolen assets on the Sonic blockchain: Over $3.4 million; • Optimism on-chain stolen assets: nearly $1.57 million; • Stolen assets on the Polygon blockchain: approximately $230,000. Crypto KOL Adi reported that preliminary investigations indicate the attack primarily targeted Balancer's V2 vaults and liquidity pools, exploiting vulnerabilities in smart contract interactions. On-chain investigators pointed out that a maliciously deployed contract manipulated Vault calls during liquidity pool initialization. Incorrect authorization and callback handling allowed the attacker to bypass safeguards, enabling unauthorized swaps or balance manipulation between interconnected liquidity pools, resulting in the rapid theft of assets within minutes. Based on the available information, there is no private key leak; this is purely a smart contract vulnerability. Kebabsec auditor and Citrea developer @okkothejawa also posted, stating that "(the check error mentioned by @moo9000) may not be the root cause, because ops.sender == msg.sender in all 'manageUserBalance' calls. The security vulnerability may have occurred in a transaction before the contract for withdrawing assets was created, as it caused some state changes in the Balancer vault." Balancer has responded, stating, "The official team is aware of the potential vulnerability affecting Balancer v2 pools. Our engineering and security teams are investigating this as a high priority. We will share verified updates and follow-up steps as soon as we obtain more information." Berachain, which faces potential asset damage risks, responded immediately. Following the Berachain Foundation's statement, Berachain founder Smokey The Bera stated that "the Bera node group has proactively suspended the operation of the public chain to prevent the Balancer vulnerability from affecting BEX (mainly the USDe three pools)." • Have the Ethena team disable Bera bridging. • USDe deposits are disabled/suspended in the lending market. • Suspension of HONEY token minting and exchange • Communicate with CEX and other entities to ensure that the hacker's address is blacklisted. Our goal is to recover funds as quickly as possible and ensure the safety of all LPs. The Berachain team will release the binary to relevant node validators and service providers as soon as it is ready (this involves some slot refactoring, etc., and not just modifying the Bera token balance, as the pool contains non-native assets). For detailed on-chain information regarding the Balancer attacker, please see: https://intel.arkm.com/explorer/entity/cd756cb8-6a84-4f40-9361-f6c548544430 The Balancer hack has alarmed crypto whales the most. As a long-established DeFi protocol, Balancer users are undoubtedly the most directly affected by this theft. For users now, the following actions can be taken: • Withdraw funds from the Balancer v2 pool to prevent further losses; • Revoke authorization: Use Revoke, DeBank, or Etherscan to revoke smart contract permissions for a Balancer address to avoid potential security risks; • Stay alert: Closely monitor the Balancer attackers' next move and whether it will have a cascading impact on other DeFi protocols. In addition, a crypto whale that had been dormant for three years was among the victims that attracted market attention during this theft. According to LookonChain monitoring, a crypto whale, 0x0090, which had been dormant for three years, has just awakened after the Balancer platform vulnerability occurred, and is eager to withdraw its $6.5 million worth of assets from Balancer. On-chain information can be found at: https://intel.arkm.com/explorer/address/0x009023dA14A3C9f448B75f33cEb9291c21373bD8 Follow-up developments: Hackers begin token exchange scheme According to on-chain analyst Ember, the hackers involved in the Balancer theft have begun attempting to exchange numerous Liquidity Staking Tokens (LST) for ETH. Previously, they exchanged 10 osETH for 10.55 ETH. On-chain information shows that hackers are using Cow Protocol to continuously exchange stolen assets across multiple blockchains for assets such as ETH and USDC. Currently, the chances of recovering these stolen assets appear slim. Odaily will continue to follow up on whether Balancer can find the vulnerability in the protocol contract in time and recover the stolen assets or provide a corresponding solution.Original title: "Established DeFi Platform Falls: Balancer V2 Contract Vulnerability Leads to the Theft of Over $110 Million in Assets" Original author: Wenser, Odaily Planet Daily On November 3rd, it was reported that Balancer, a long-established DeFi protocol, had suffered a theft of over $70 million in assets. This news was subsequently confirmed by multiple sources, and the amount of stolen funds continued to rise. As of this writing, the amount of stolen assets from Balancer has increased to over $116 million. Odaily will provide a brief analysis of this matter in this article. Details of the Balancer theft: Losses exceeded $116 million, primarily due to a vulnerability in the v2 pool smart contract. According to on-chain information, the Balancer attackers have stolen over $116 million, primarily in the form of WETH, wstETH, osETH, frxETH, rsETH, and rETH, distributed across multiple chains including ETH, Base, and Sonic. • Assets stolen from the Ethereum blockchain: approximately $100 million; • Nearly $8 million in assets stolen from the Arbitrum blockchain; • Stolen assets on the Base blockchain: nearly $3.95 million; • Stolen assets on the Sonic blockchain: Over $3.4 million; • Optimism on-chain stolen assets: nearly $1.57 million; • Stolen assets on the Polygon blockchain: approximately $230,000. Crypto KOL Adi reported that preliminary investigations indicate the attack primarily targeted Balancer's V2 vaults and liquidity pools, exploiting vulnerabilities in smart contract interactions. On-chain investigators pointed out that a maliciously deployed contract manipulated Vault calls during liquidity pool initialization. Incorrect authorization and callback handling allowed the attacker to bypass safeguards, enabling unauthorized swaps or balance manipulation between interconnected liquidity pools, resulting in the rapid theft of assets within minutes. Based on the available information, there is no private key leak; this is purely a smart contract vulnerability. Kebabsec auditor and Citrea developer @okkothejawa also posted, stating that "(the check error mentioned by @moo9000) may not be the root cause, because ops.sender == msg.sender in all 'manageUserBalance' calls. The security vulnerability may have occurred in a transaction before the contract for withdrawing assets was created, as it caused some state changes in the Balancer vault." Balancer has responded, stating, "The official team is aware of the potential vulnerability affecting Balancer v2 pools. Our engineering and security teams are investigating this as a high priority. We will share verified updates and follow-up steps as soon as we obtain more information." Berachain, which faces potential asset damage risks, responded immediately. Following the Berachain Foundation's statement, Berachain founder Smokey The Bera stated that "the Bera node group has proactively suspended the operation of the public chain to prevent the Balancer vulnerability from affecting BEX (mainly the USDe three pools)." • Have the Ethena team disable Bera bridging. • USDe deposits are disabled/suspended in the lending market. • Suspension of HONEY token minting and exchange • Communicate with CEX and other entities to ensure that the hacker's address is blacklisted. Our goal is to recover funds as quickly as possible and ensure the safety of all LPs. The Berachain team will release the binary to relevant node validators and service providers as soon as it is ready (this involves some slot refactoring, etc., and not just modifying the Bera token balance, as the pool contains non-native assets). For detailed on-chain information regarding the Balancer attacker, please see: https://intel.arkm.com/explorer/entity/cd756cb8-6a84-4f40-9361-f6c548544430 The Balancer hack has alarmed crypto whales the most. As a long-established DeFi protocol, Balancer users are undoubtedly the most directly affected by this theft. For users now, the following actions can be taken: • Withdraw funds from the Balancer v2 pool to prevent further losses; • Revoke authorization: Use Revoke, DeBank, or Etherscan to revoke smart contract permissions for a Balancer address to avoid potential security risks; • Stay alert: Closely monitor the Balancer attackers' next move and whether it will have a cascading impact on other DeFi protocols. In addition, a crypto whale that had been dormant for three years was among the victims that attracted market attention during this theft. According to LookonChain monitoring, a crypto whale, 0x0090, which had been dormant for three years, has just awakened after the Balancer platform vulnerability occurred, and is eager to withdraw its $6.5 million worth of assets from Balancer. On-chain information can be found at: https://intel.arkm.com/explorer/address/0x009023dA14A3C9f448B75f33cEb9291c21373bD8 Follow-up developments: Hackers begin token exchange scheme According to on-chain analyst Ember, the hackers involved in the Balancer theft have begun attempting to exchange numerous Liquidity Staking Tokens (LST) for ETH. Previously, they exchanged 10 osETH for 10.55 ETH. On-chain information shows that hackers are using Cow Protocol to continuously exchange stolen assets across multiple blockchains for assets such as ETH and USDC. Currently, the chances of recovering these stolen assets appear slim. Odaily will continue to follow up on whether Balancer can find the vulnerability in the protocol contract in time and recover the stolen assets or provide a corresponding solution.

A complete analysis of the Balancer V2 contract vulnerability incident: the whole story of the theft of over $116 million in assets.

2025/11/04 10:00
5 min read

Original title: "Established DeFi Platform Falls: Balancer V2 Contract Vulnerability Leads to the Theft of Over $110 Million in Assets"

Original author: Wenser, Odaily Planet Daily

On November 3rd, it was reported that Balancer, a long-established DeFi protocol, had suffered a theft of over $70 million in assets. This news was subsequently confirmed by multiple sources, and the amount of stolen funds continued to rise. As of this writing, the amount of stolen assets from Balancer has increased to over $116 million. Odaily will provide a brief analysis of this matter in this article.

Details of the Balancer theft: Losses exceeded $116 million, primarily due to a vulnerability in the v2 pool smart contract.

According to on-chain information, the Balancer attackers have stolen over $116 million, primarily in the form of WETH, wstETH, osETH, frxETH, rsETH, and rETH, distributed across multiple chains including ETH, Base, and Sonic.

• Assets stolen from the Ethereum blockchain: approximately $100 million;

• Nearly $8 million in assets stolen from the Arbitrum blockchain;

• Stolen assets on the Base blockchain: nearly $3.95 million;

• Stolen assets on the Sonic blockchain: Over $3.4 million;

• Optimism on-chain stolen assets: nearly $1.57 million;

• Stolen assets on the Polygon blockchain: approximately $230,000.

Crypto KOL Adi reported that preliminary investigations indicate the attack primarily targeted Balancer's V2 vaults and liquidity pools, exploiting vulnerabilities in smart contract interactions. On-chain investigators pointed out that a maliciously deployed contract manipulated Vault calls during liquidity pool initialization. Incorrect authorization and callback handling allowed the attacker to bypass safeguards, enabling unauthorized swaps or balance manipulation between interconnected liquidity pools, resulting in the rapid theft of assets within minutes.

Based on the available information, there is no private key leak; this is purely a smart contract vulnerability.

Kebabsec auditor and Citrea developer @okkothejawa also posted, stating that "(the check error mentioned by @moo9000) may not be the root cause, because ops.sender == msg.sender in all 'manageUserBalance' calls. The security vulnerability may have occurred in a transaction before the contract for withdrawing assets was created, as it caused some state changes in the Balancer vault."

Balancer has responded, stating, "The official team is aware of the potential vulnerability affecting Balancer v2 pools. Our engineering and security teams are investigating this as a high priority. We will share verified updates and follow-up steps as soon as we obtain more information."

Berachain, which faces potential asset damage risks, responded immediately. Following the Berachain Foundation's statement, Berachain founder Smokey The Bera stated that "the Bera node group has proactively suspended the operation of the public chain to prevent the Balancer vulnerability from affecting BEX (mainly the USDe three pools)."

• Have the Ethena team disable Bera bridging.

• USDe deposits are disabled/suspended in the lending market.

• Suspension of HONEY token minting and exchange

• Communicate with CEX and other entities to ensure that the hacker's address is blacklisted.

Our goal is to recover funds as quickly as possible and ensure the safety of all LPs. The Berachain team will release the binary to relevant node validators and service providers as soon as it is ready (this involves some slot refactoring, etc., and not just modifying the Bera token balance, as the pool contains non-native assets).

For detailed on-chain information regarding the Balancer attacker, please see: https://intel.arkm.com/explorer/entity/cd756cb8-6a84-4f40-9361-f6c548544430

The Balancer hack has alarmed crypto whales the most.

As a long-established DeFi protocol, Balancer users are undoubtedly the most directly affected by this theft. For users now, the following actions can be taken:

• Withdraw funds from the Balancer v2 pool to prevent further losses;

• Revoke authorization: Use Revoke, DeBank, or Etherscan to revoke smart contract permissions for a Balancer address to avoid potential security risks;

• Stay alert: Closely monitor the Balancer attackers' next move and whether it will have a cascading impact on other DeFi protocols.

In addition, a crypto whale that had been dormant for three years was among the victims that attracted market attention during this theft.

According to LookonChain monitoring, a crypto whale, 0x0090, which had been dormant for three years, has just awakened after the Balancer platform vulnerability occurred, and is eager to withdraw its $6.5 million worth of assets from Balancer. On-chain information can be found at: https://intel.arkm.com/explorer/address/0x009023dA14A3C9f448B75f33cEb9291c21373bD8

Follow-up developments: Hackers begin token exchange scheme

According to on-chain analyst Ember, the hackers involved in the Balancer theft have begun attempting to exchange numerous Liquidity Staking Tokens (LST) for ETH. Previously, they exchanged 10 osETH for 10.55 ETH.

On-chain information shows that hackers are using Cow Protocol to continuously exchange stolen assets across multiple blockchains for assets such as ETH and USDC. Currently, the chances of recovering these stolen assets appear slim.

Odaily will continue to follow up on whether Balancer can find the vulnerability in the protocol contract in time and recover the stolen assets or provide a corresponding solution.

Market Opportunity
DeFi Logo
DeFi Price(DEFI)
$0.000315
$0.000315$0.000315
-3.07%
USD
DeFi (DEFI) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Wormhole Unveils W Token 2.0 with Enhanced Tokenomics

Wormhole Unveils W Token 2.0 with Enhanced Tokenomics

The post Wormhole Unveils W Token 2.0 with Enhanced Tokenomics appeared on BitcoinEthereumNews.com. Joerg Hiller Sep 17, 2025 13:57 Wormhole introduces W Token 2.0, featuring upgraded tokenomics, a strategic Wormhole Reserve, and a 4% base yield, aiming to optimize ecosystem growth and align incentives. Wormhole has announced a significant upgrade to its native token, unveiling the W Token 2.0. This upgrade introduces new tokenomics including the establishment of a Wormhole Reserve, a 4% base yield, and an optimized unlock schedule, marking a pivotal development in the ecosystem, according to Wormhole. The W Token Evolution Launched in October 2020, Wormhole’s W token has been central to the platform’s mission of creating a connected internet economy. The latest upgrade aims to enhance the token’s utility across more than 40 blockchains. With a capped supply of 10 billion, the W token supports governance, staking, and ecosystem growth, aligning incentives for network security and development. Introducing the Wormhole Reserve The Wormhole Reserve will accumulate value from both onchain and offchain activities, supporting the ecosystem’s expansion. As Wormhole adoption grows, the token will capture value through network expansions and ecosystem applications, ensuring that growth is directly reflected in the token’s value. 4% Base Yield and Governance Rewards Wormhole 2.0 introduces a 4% base yield for W holders who actively participate in governance. The yield, derived from existing token supplies and protocol revenues, is designed to incentivize active participation without inflating the token supply. Optimized Unlock Schedule Updating its token release schedule, Wormhole replaces annual cliffs with bi-weekly unlocks, starting October 3, 2025. This change aims to reduce market pressure and provide a more stable environment for investors and contributors. The bi-weekly schedule will span over 4.5 years, affecting categories such as Guardian Nodes and Community & Launch. Wormhole’s Future Vision With these upgrades, Wormhole aims to expand its role as…
Share
BitcoinEthereumNews2025/09/18 15:48
Hacker behind the UXLINK attack loses $48 million to a phishing scam

Hacker behind the UXLINK attack loses $48 million to a phishing scam

The post Hacker behind the UXLINK attack loses $48 million to a phishing scam appeared on BitcoinEthereumNews.com. The UXLINK exploiter has been phished merely hours after the AI-powered Web 3 social platform’s multi-sig wallet had been breached. Lookonchain had reported on Monday that UXLINK’s multi-signature wallet was compromised, with funds drained across centralized and decentralized exchanges.  According to the blockchain analytics platform, the attacker was phished and lost 542 million UXLINK tokens, valued at approximately $48 million.  Interestingly, the hacker who attacked $UXLINK was targeted by a phishing attack and lost 542M $UXLINK($48M).https://t.co/Cp9QNHPE8Xhttps://t.co/M8tbPYAdiq pic.twitter.com/PxadIIfkDi — Lookonchain (@lookonchain) September 23, 2025 UXLINK had earlier admitted that its multi-sig wallet had been breached, and said that “a significant amount of crypto” was illicitly transferred, but most of them were frozen. “Our team is working through legal and compliant measures to ensure that the UXLINK token supply fully aligns with the rules stated in the whitepaper. The white paper remains the sole community consensus and standard for UXLINK’s token economy,” the project team wrote on X. UXLINK breach involved six wallets Security monitoring firm Cyvers Alerts flagged unusual activity early Monday on an Ethereum address linked to UXLINK. The account executed a delegateCall, removed the existing administrator role, and added a new multisig owner. After making the change, the hacker moved at least $4 million in USDT, $500,000 in USDC, 3.7 wrapped Bitcoin (WBTC), and 25 ETH. Onchain evidence also showed that the attacker sold UXLINK tokens on decentralized exchanges using six separate wallets. These trades netted at least 6,732 ETH, valued at roughly $28.1 million. Hours after pulling off the UXLINK exploit, the attacker themselves fell victim to a phishing scheme. Arbiscan onchain records show the loss occurred on Tuesday at around 02:15 UTC under the transaction hash 0xa70674ccc9caa17d6efaf3f6fcbd5dec40011744c18a1057f391a822f11986ee. Phishing attack on the UXLINK scammer. Source: Arbiscan. Two large transfers of UXLINK tokens were directed from the…
Share
BitcoinEthereumNews2025/09/23 18:34
Tron Makes Bold Moves in TRX Tokens Acquisition

Tron Makes Bold Moves in TRX Tokens Acquisition

Tron's Justin Sun supports TRX's strategic treasury initiative. TRX prices rise, signaling short-term recovery, yet long-term climate is uncertain. Continue Reading
Share
Coinstats2026/02/09 15:28