Security Researchers Thwart $10M DeFi Exploit in Thousands of Smart Contracts
In a significant DeFi security breakthrough, researchers have successfully neutralized a critical threat targeting thousands of smart contracts, preventing the potential theft of over $10 million in cryptocurrency. The exploit, discovered by the Venn Network team, involved a sophisticated backdoor in uninitialized ERC-1967 proxy contracts that could have allowed attackers to hijack these contracts before proper setup.
Discovery and Rapid Response
Security teams identified the vulnerability on Tuesday, launching an intensive 36-hour operation to secure vulnerable funds. The collaborative effort involved developers and security experts including Pcaversaccio, Dedaub, and Seal 911, who worked to evaluate and protect affected contracts before attackers could access assets.
Attack Methodology
Or Dadosh, Venn Network’s co-founder and president, explained that attackers exploited deployment processes to insert malicious code into thousands of contracts. This hidden backdoor remained undetectable for months, enabling nearly invisible malicious activity once contracts were initialized. The sophisticated approach suggested careful planning and technical expertise.
Industry Response and Investigation
Multiple DeFi protocols quickly secured vulnerable funds during the operation. The Berachain Foundation temporarily paused its incentive claim contract and safely transferred funds, protecting all user assets. Security analyst David Benchimol noted the attack’s complexity and broad deployment across EVM chains, suggesting possible involvement by the North Korean Lazarus Group, though this remains unconfirmed.
Key Security Takeaways
- Exploit targeted uninitialized ERC-1967 proxy contracts
- Over $10 million in cryptocurrency was potentially at risk
- Coordinated response prevented fund losses
- Attack sophistication suggests advanced threat actor involvement