The post Moonwell Protocol Loses $1M in Oracle Manipulation Exploit appeared on BitcoinEthereumNews.com. BlockSec Phalcon detects suspicious transactions targeting Moonwell contracts. Exploit stems from an incorrectly updated price feed from an off-chain oracle system. MEV bot possibly exploited an oracle issue, resulting in losses exceeding $1 million. On-chain threat detection platform BlockSec Phalcon has identified a series of suspicious transactions targeting Moonwell’s smart contracts. The platform issued an alert regarding the activity on Base and Optimism networks that resulted in losses exceeding $1 million. BlockSec’s analysis points to an issue with the token price feed for rsETH/ETH from the off-chain oracle. The exploit appears to have been carried out, possibly by a MEV bot that took advantage of incorrectly updated price data used by the protocol. ALERT! Our system detected a series of suspicious transactions targeting @MoonwellDeFi’s smart contracts on #Base and #Optimism. Our analysis indicates an issue with the token price (rsETH / ETH) feed from the off-chain oracle, which was exploited — possibly by a MEV bot —… pic.twitter.com/cNJFHI3xn3 — BlockSec Phalcon (@Phalcon_xyz) November 4, 2025 The attack exploited a vulnerability in how the protocol received and processed price information from external data sources. When the rsETH/ETH price feed failed to update correctly, the discrepancy between actual market prices and protocol prices created an arbitrage opportunity. MEV bots typically scan blockchain networks for profitable opportunities, including price discrepancies across protocols. In this case, the bot appears to have identified the oracle malfunction and executed transactions to extract value before the issue could be corrected. BlockSec noted that no direct contact method was available to reach the project team immediately. The platform requested that anyone with questions or relevant information reach out directly to them for coordination. The Moonwell incident follows a larger exploit targeting the Balancer protocol on November 3, 2025. That attack resulted in losses exceeding $70 million, making it… The post Moonwell Protocol Loses $1M in Oracle Manipulation Exploit appeared on BitcoinEthereumNews.com. BlockSec Phalcon detects suspicious transactions targeting Moonwell contracts. Exploit stems from an incorrectly updated price feed from an off-chain oracle system. MEV bot possibly exploited an oracle issue, resulting in losses exceeding $1 million. On-chain threat detection platform BlockSec Phalcon has identified a series of suspicious transactions targeting Moonwell’s smart contracts. The platform issued an alert regarding the activity on Base and Optimism networks that resulted in losses exceeding $1 million. BlockSec’s analysis points to an issue with the token price feed for rsETH/ETH from the off-chain oracle. The exploit appears to have been carried out, possibly by a MEV bot that took advantage of incorrectly updated price data used by the protocol. ALERT! Our system detected a series of suspicious transactions targeting @MoonwellDeFi’s smart contracts on #Base and #Optimism. Our analysis indicates an issue with the token price (rsETH / ETH) feed from the off-chain oracle, which was exploited — possibly by a MEV bot —… pic.twitter.com/cNJFHI3xn3 — BlockSec Phalcon (@Phalcon_xyz) November 4, 2025 The attack exploited a vulnerability in how the protocol received and processed price information from external data sources. When the rsETH/ETH price feed failed to update correctly, the discrepancy between actual market prices and protocol prices created an arbitrage opportunity. MEV bots typically scan blockchain networks for profitable opportunities, including price discrepancies across protocols. In this case, the bot appears to have identified the oracle malfunction and executed transactions to extract value before the issue could be corrected. BlockSec noted that no direct contact method was available to reach the project team immediately. The platform requested that anyone with questions or relevant information reach out directly to them for coordination. The Moonwell incident follows a larger exploit targeting the Balancer protocol on November 3, 2025. That attack resulted in losses exceeding $70 million, making it…

Moonwell Protocol Loses $1M in Oracle Manipulation Exploit

2025/11/05 03:34
  • BlockSec Phalcon detects suspicious transactions targeting Moonwell contracts.
  • Exploit stems from an incorrectly updated price feed from an off-chain oracle system.
  • MEV bot possibly exploited an oracle issue, resulting in losses exceeding $1 million.

On-chain threat detection platform BlockSec Phalcon has identified a series of suspicious transactions targeting Moonwell’s smart contracts. The platform issued an alert regarding the activity on Base and Optimism networks that resulted in losses exceeding $1 million.

BlockSec’s analysis points to an issue with the token price feed for rsETH/ETH from the off-chain oracle. The exploit appears to have been carried out, possibly by a MEV bot that took advantage of incorrectly updated price data used by the protocol.

The attack exploited a vulnerability in how the protocol received and processed price information from external data sources. When the rsETH/ETH price feed failed to update correctly, the discrepancy between actual market prices and protocol prices created an arbitrage opportunity.

MEV bots typically scan blockchain networks for profitable opportunities, including price discrepancies across protocols. In this case, the bot appears to have identified the oracle malfunction and executed transactions to extract value before the issue could be corrected.

BlockSec noted that no direct contact method was available to reach the project team immediately. The platform requested that anyone with questions or relevant information reach out directly to them for coordination.

The Moonwell incident follows a larger exploit targeting the Balancer protocol on November 3, 2025. That attack resulted in losses exceeding $70 million, making it one of the most damaging recent breaches in decentralized finance.

Balancer Suffers $110M in Rapid Drainage

Attackers compromised Balancer by quickly siphoning funds from multiple liquidity pools. The hackers consolidated stolen assets into a newly created wallet within minutes of initiating the attack.

Confirmed stolen assets from the Balancer breach included 6,850 OSETH, 6,590 WETH, and 4,260 wSTETH. The speed of the attack and consolidation suggests sophisticated planning and execution by the attackers.

Oracle vulnerabilities have become an increasing concern for DeFi protocols relying on external price feeds. These systems depend on accurate real-time data to function properly, and any manipulation or failure in the oracle mechanism can create exploitable conditions.

The incidents highlight ongoing security challenges facing decentralized finance platforms. Despite advances in smart contract security, oracle dependencies and price feed mechanisms remain potential attack vectors that require constant monitoring and robust failsafe systems.

Related: https://coinedition.com/stakewise-recovers-20-7-million-from-balancer-exploit-to-reimburse-users-pro-rata/

Disclaimer: The information presented in this article is for informational and educational purposes only. The article does not constitute financial advice or advice of any kind. Coin Edition is not responsible for any losses incurred as a result of the utilization of content, products, or services mentioned. Readers are advised to exercise caution before taking any action related to the company.

Source: https://coinedition.com/moonwell-protocol-loses-over-1m-in-oracle-price-feed-exploit-on-base-and-optimism/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31