<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Balancer hack Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/balancer-hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/balancer-hack/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Fri, 14 Nov 2025 12:38:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Balancer hack Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/balancer-hack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Balancer Hack Update: Attacker Starts Selling Stolen Tokens</title>
		<link>https://coinengineer.net/blog/balancer-hack-update-attacker-selling-stolen-tokens/</link>
					<comments>https://coinengineer.net/blog/balancer-hack-update-attacker-selling-stolen-tokens/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 13:30:34 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Balancer hack]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[Cetus Protocol]]></category>
		<category><![CDATA[Crypto Exploit]]></category>
		<category><![CDATA[DeFi security]]></category>
		<category><![CDATA[ethereum transfer]]></category>
		<category><![CDATA[On-Chain Analysis]]></category>
		<category><![CDATA[stakewise osETH]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=57020</guid>

					<description><![CDATA[<p>The Balancer hack entered a new phase as the attacker began to liquidate stolen tokens shortly after the protocol confirmed the recovery of $4.1 million. Fresh movements across multiple addresses indicate preparation for additional selling, and on-chain analysts continue to track the rapid flow of funds. Arkham Intelligence reported that the exploiter transferred 6,999 ETH</p>
<p>The post <a href="https://coinengineer.net/blog/balancer-hack-update-attacker-selling-stolen-tokens/">Balancer Hack Update: Attacker Starts Selling Stolen Tokens</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="735" data-end="1050">The <strong>Balancer <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">hack</a></strong> entered a new phase as the attacker began to liquidate stolen tokens shortly after the protocol confirmed the recovery of $4.1 million. Fresh movements across multiple addresses indicate preparation for additional selling, and on-chain analysts continue to track the rapid flow of funds.</p>
<p data-start="1052" data-end="1420">Arkham Intelligence reported that the exploiter transferred 6,999<strong> ETH</strong> to a newly created wallet. The movement followed an earlier one-ETH test transaction the attacker used to verify routing paths, a method frequently seen in DeFi exploit behavior. These transfers suggest a coordinated attempt to secure exit liquidity before further recovery efforts restrict access.</p>
<h2 data-start="1422" data-end="1944">Recovery Efforts Reveal Hidden Scaling Vulnerability</h2>
<p data-start="1422" data-end="1944">Balancer stated that the recovered amount was tied to a vulnerability inside its internal scaling logic. The issue originated from a function responsible for adjusting token values during pool calculations. The attacker identified small rounding discrepancies and repeated swap operations to generate precise micro-profits. This approach differed from earlier Balancer incidents and demonstrated how new attack vectors continue to emerge in decentralized finance.</p>
<p data-start="1946" data-end="2383">StakeWise also recovered a major portion of the assets drained during the event. The project retrieved 5,041 <a href="https://x.com/Balancer/status/1988685056982835470?s=20">osETH</a> through a smart contract call, reducing the overall stolen amount from $117 million to $98 million. The improvement helped several platforms restore halted services. Stader Polygon resumed MaticX unstaking after temporarily suspending withdrawals to prevent liquidity access during the critical stage of the investigation.</p>
<h2 data-start="2385" data-end="3066">Major Crypto Security Breaches Continue Through 2025</h2>
<p data-start="2385" data-end="3066">The Balancer exploit adds to a series of high-impact attacks that shaped the crypto landscape in 2025. Earlier in the year, Cetus Protocol lost $260 million after a coordinated exploit. Investigators traced 12.9 million SUI to an attacker-linked wallet before the funds were moved through USDC and converted into ETH. Bybit also faced a severe security breach involving more than $1.4 billion in digital assets, marked by unusual ETH withdrawals from addresses tied to exchange inflows. Centralized platform BigONE reported a $27 million loss after attackers accessed its hot wallet, draining BTC, ETH, SOL, SHIB and USDT.</p>
<p data-start="3068" data-end="3329">These incidents illustrate a broader trend of exploiters combining multi-chain routing, stablecoin swaps and rapid wallet transitions to obscure their tracks. Analysts emphasize that these patterns now form a consistent framework across most high-value attacks.</p>
<h2 data-start="3331" data-end="3844">On-Chain Signals and Market Impact as the Investigation Continues</h2>
<p data-start="3331" data-end="3844">The attacker’s movements have intensified market attention as observers monitor large-scale transfers and potential liquidation strategies. The ongoing activity increases concerns about short-term liquidity pressure, especially in ecosystems linked to Balancer’s pools. On-chain experts note that rising conversion frequency, new address creation and repeated routing tests often indicate imminent selling phases during post-exploit periods.</p>
<p data-start="3846" data-end="4114">The Balancer hack continues to evolve as investigators analyze transaction patterns and track the remaining assets. Market participants remain alert, recognizing that the attacker’s next steps could influence sentiment, trading volume and liquidity in the coming days.</p>
<p data-start="3846" data-end="4114"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener">YouTube</a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/balancer-hack-update-attacker-selling-stolen-tokens/">Balancer Hack Update: Attacker Starts Selling Stolen Tokens</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/balancer-hack-update-attacker-selling-stolen-tokens/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Was the Balancer DEX Hack Prepared Months in Advance?</title>
		<link>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/</link>
					<comments>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 13:30:53 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[balancer]]></category>
		<category><![CDATA[Balancer hack]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyvers]]></category>
		<category><![CDATA[DEX exploit]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[tornado cash]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=55990</guid>

					<description><![CDATA[<p>An experienced attacker stole $116 million from Balancer DEX on Monday after months of preparation. On-chain data shows the attacker used Tornado Cash and sophisticated methods to move funds without leaving traces, indicating the operation was planned in advance. Details of the Attack and Preparation Blockchain analyses show the attacker funded their account stealthily with</p>
<p>The post <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">Was the Balancer DEX Hack Prepared Months in Advance?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="57" data-end="320">An experienced attacker stole $116 million from <strong>Balancer <a href="https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/">DEX</a></strong> on Monday after months of preparation. On-chain data shows the <strong>attacker</strong> used Tornado Cash and sophisticated methods to move funds without leaving traces, indicating the operation was planned in advance.</p>
<h2 data-start="322" data-end="362">Details of the Attack and Preparation</h2>
<p data-start="364" data-end="998">Blockchain analyses show the attacker funded their account stealthily with small 0.1 ETH transfers through Tornado Cash to avoid detection. Coinbase executive Conor Grogan said the attacker stored at least 100 ETH in Tornado Cash smart contracts and that those funds may link to earlier hacks. Grogan stated, “Hacker seems experienced: seeded the account with 100 <strong>ETH</strong> and operated with 0.1 ETH Tornado Cash transfers. No opsec leaks.” This behavior clearly points to a professional actor who prepared ahead of time. Balancer announced it would offer a 20% white‑hat bounty if the stolen funds were returned in full (minus the reward).</p>
<h2 data-start="1061" data-end="1099">What Makes the Balancer Hack Unique</h2>
<p data-start="138" data-end="470">Deddy Lavid, co‑founder and CEO of blockchain security firm Cyvers, called the Balancer exploit one of the most sophisticated attacks of 2025. The attackers bypassed access control layers to manipulate asset balances directly. This represents a critical failure in operational governance rather than a flaw in core protocol logic.</p>
<p data-start="472" data-end="655">Lavid also warned that static code audits are no longer enough. He urged platforms to implement continuous, real‑time monitoring to detect suspicious flows before funds are drained.</p>
<p data-start="138" data-end="470">, co‑founder and CEO of blockchain security firm Cyvers, called the Balancer exploit one of the most sophisticated attacks of 2025. The attackers bypassed access control layers to manipulate asset balances directly. This represents a critical failure in operational governance rather than a flaw in core protocol logic.</p>
<p data-start="472" data-end="655">Lavid also warned that static code audits are no longer enough. He urged platforms to implement continuous, real‑time monitoring to detect suspicious flows before funds are drained.</p>
<h2 data-start="1628" data-end="1681">Lazarus Group and Long‑Term Preparation Strategies</h2>
<p data-start="1683" data-end="2246">Similarly, North Korean group <strong>Lazarus</strong> reportedly paused illicit activity for months before the Bybit hack. Chainalysis data showed a sharp decline in cybercriminal activity after July 1, 2024, which experts interpreted as regrouping to identify new targets and probe infrastructure.</p>
<p data-start="1683" data-end="2246">In the Bybit incident, attackers laundered the $1.4 billion through THORChain within 10 days. That operation demonstrates how months‑long stealth and preparation can precede large, professionally executed exploits—parallels that highlight the seriousness of the Balancer incident.</p>
<h2 data-start="2248" data-end="2285">Recommendations for Balancer Users</h2>
<p data-start="2287" data-end="2609">Store crypto assets only in trusted wallets and avoid moving large sums in single transactions. Be aware that using Tornado Cash and similar mixers can draw attention from professional attackers and investigators, and consider employing multi‑layer security practices to reduce exposure to sophisticated on‑chain exploits.</p>
<p data-start="2287" data-end="2609"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener">YouTube</a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">Was the Balancer DEX Hack Prepared Months in Advance?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Balancer Hack: Stolen Millions Moved Into This Coin!</title>
		<link>https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/</link>
					<comments>https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 07:26:24 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Balancer hack]]></category>
		<category><![CDATA[crypto security breach]]></category>
		<category><![CDATA[DeFi exploit]]></category>
		<category><![CDATA[hacked liquidity pools]]></category>
		<category><![CDATA[On-Chain Analysis]]></category>
		<category><![CDATA[stolen funds]]></category>
		<category><![CDATA[V2 Balancer attack]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=55912</guid>

					<description><![CDATA[<p>Balancer, one of the leading protocols in the DeFi ecosystem, has faced one of the largest attacks in recent years. In the exploit targeting Balancer’s V2 pools, the total amount drained from the platform exceeded $116.6 million. Some analyses even estimate the losses to be as high as $128 million. This incident has sparked widespread</p>
<p>The post <a href="https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/">Balancer Hack: Stolen Millions Moved Into This Coin!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="177" data-end="587"><strong>Balancer</strong>, one of the leading protocols in the DeFi ecosystem, has faced one of the largest attacks in recent years. In the exploit targeting Balancer’s V2 pools, the total amount drained from the platform exceeded $116.6 million. Some analyses even estimate the losses to be as high as $128 million. This incident has sparked widespread discussions around the question: “What is the Balancer <a href="https://coinengineer.net/blog/defi-protocol-balancer-has-been-hacked/">hack</a>?”</p>
<h3 data-start="594" data-end="631">Main Components of the Attack</h3>
<p data-start="633" data-end="738">According to Arkham and other on-chain analysts, the stolen assets primarily consisted of two categories:</p>
<ul data-start="740" data-end="858">
<li data-start="740" data-end="830">
<p data-start="742" data-end="830">Liquid Staked Ethereum (LSETH) derivatives, particularly wstETH and osETH,</p>
</li>
<li data-start="831" data-end="858">
<p data-start="833" data-end="858">WETH (Wrapped Ether).</p>
</li>
</ul>
<p data-start="860" data-end="996">The high liquidity of these assets enabled the attacker to quickly convert them into other forms without attracting immediate attention.</p>
<h3 data-start="1003" data-end="1055">How the Hacker Moved and Laundered the Funds</h3>
<p data-start="1057" data-end="1107">On-chain tracking revealed a three-stage strategy:</p>
<ol data-start="1109" data-end="1772">
<li data-start="1109" data-end="1261">
<p data-start="1112" data-end="1261">Consolidation of Funds<br data-start="1138" data-end="1141" />The stolen wstETH, osETH and WETH were first gathered into several primary collection wallets linked to the attacker.</p>
</li>
<li data-start="1263" data-end="1503">
<p data-start="1266" data-end="1503">Asset Swaps via DEXs<br data-start="1290" data-end="1293" />The attacker then swapped these LSETH derivatives and WETH into ETH using decentralized exchanges. This move helped consolidate value into a single asset type, making it easier to manage and harder to trace.</p>
</li>
<li data-start="1505" data-end="1772">
<p data-start="1508" data-end="1772">Distribution Across New Wallets<br data-start="1543" data-end="1546" />The converted ETH was transferred into a large number of newly created wallets. This “distribution network” is a common laundering technique designed to make tracking harder for investigators and blockchain analytics firms.</p>
</li>
</ol>
<h3 data-start="1779" data-end="1816">A Multi-Chain Security Breach</h3>
<p data-start="1818" data-end="2087">The attack was not limited to the Ethereum network. Balancer pools across Arbitrum, Base, Optimism, and Polygon were also affected. Liquidity providers saw sudden drops in pool balances, and many users rushed to revoke token approvals from Balancer smart contracts.</p>
<h3 data-start="2094" data-end="2121">Balancer’s Response</h3>
<p data-start="2123" data-end="2196">In response to the exploit, the Balancer team took the following actions:</p>
<ul data-start="2198" data-end="2573">
<li data-start="2198" data-end="2280">
<p data-start="2200" data-end="2280">Paused all affected V2 pools that could be secured via emergency controls,</p>
</li>
<li data-start="2281" data-end="2362">
<p data-start="2283" data-end="2362">Advised liquidity providers to revoke token approvals and withdraw funds,</p>
</li>
<li data-start="2363" data-end="2439">
<p data-start="2365" data-end="2439">Offered up to 20% white-hat bounty if the stolen funds are returned,</p>
</li>
<li data-start="2440" data-end="2573">
<p data-start="2442" data-end="2573">Initiated a comprehensive post-mortem investigation and legal action alongside blockchain forensic experts and law enforcement.</p>
</li>
</ul>
<p><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/">Balancer Hack: Stolen Millions Moved Into This Coin!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/Coinmukendisi-14.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/Coinmukendisi-14.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
