<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>defi hack Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/defi-hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/defi-hack/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Sun, 05 Oct 2025 08:13:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>defi hack Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/defi-hack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DeFi Protocol Abracadabra Money Loses $1.7M in Hack Attack</title>
		<link>https://coinengineer.net/blog/defi-abracadabra-money-hack/</link>
					<comments>https://coinengineer.net/blog/defi-abracadabra-money-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Sun, 05 Oct 2025 09:00:59 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Abracadabra.money]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[Crypto Theft]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[DeFi news]]></category>
		<category><![CDATA[investor alert]]></category>
		<category><![CDATA[MIM token]]></category>
		<category><![CDATA[smart contract]]></category>
		<category><![CDATA[tornado cash]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=53335</guid>

					<description><![CDATA[<p>DeFi protocol Abracadabra Money lost approximately $1.7 million in a recent hack. The attacker transferred the stolen funds to Tornado Cash to hide the trail. The team has not released an official statement yet, but blockchain researchers have confirmed the attack. This event highlights the ongoing security risks in DeFi platforms.  Hack Details and Impact </p>
<p>The post <a href="https://coinengineer.net/blog/defi-abracadabra-money-hack/">DeFi Protocol Abracadabra Money Loses $1.7M in Hack Attack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span class="TextRun SCXW33159141 BCX0" lang="TR-TR" xml:lang="TR-TR" data-c><span class="NormalTextRun SCXW33159141 BCX0"><a href="https://coinengineer.net/blog/category/project-review/defi-projects/"><strong>DeFi</strong></a> protocol <strong>Abracadabra Money</strong> lost approximately $1.7 million in a recent <strong>hack</strong>. The attacker transferred the stolen funds to Tornado Cash to hide the trail. The team has not released an official statement yet, but blockchain researchers have confirmed the attack. This event highlights the ongoing security risks in DeFi platforms.</span></span><span class="EOP SCXW33159141 BCX0" data-ccp-props="{}"> </span></p>
<h2><span data-c>Hack Details and Impact</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Abracadabra Money has now been attacked for the third time in the past two years. In 2024 and 2025, it lost $6.49 million and $13 million, respectively. According to blockchain researchers @officer_cia and Weilin William Li, the attacker exploited a vulnerability in Abracadabra’s smart contracts. Around $1.7 million in MIM tokens was withdrawn and swapped for ~395 ETH.</span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-c>All affected smart contracts have been paused.</span><span data-ccp-props="{}"> </span></li>
<li><span data-c>The attacker bypassed payment controls to quickly transfer the funds.</span><span data-ccp-props="{}"> </span></li>
<li><span data-c>Abracadabra team has not yet released an official statement.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h2><span data-c>Market Reaction and Precautions</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Abracadabra Money previously lost $13 million in a March 2025 hack. The recent attack has increased community calls for stress tests and comprehensive smart contract audits.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>According to CoinMarketCap, Magic Internet Money (MIM) saw a 16.98% drop in trading volume. The 60-day price decline reached 40.26%, while the 90-day increase recorded 19.83%. This underscores the sensitivity of investor confidence.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>The incident reignites discussions on security measures in the DeFi sector. Experts emphasize that proactive security testing and rigorous smart contract audits are critical.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </strong></a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</strong></a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</strong></a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/defi-abracadabra-money-hack/">DeFi Protocol Abracadabra Money Loses $1.7M in Hack Attack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/defi-abracadabra-money-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/08/ethereum_hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/08/ethereum_hack_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>2 Million Dollar Hack Hits BSC Token, Price Drops 88%</title>
		<link>https://coinengineer.net/blog/bsc-ngp-token-2m-dollar-hack-price-drop/</link>
					<comments>https://coinengineer.net/blog/bsc-ngp-token-2m-dollar-hack-price-drop/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 07:18:43 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Binance Smart Chain]]></category>
		<category><![CDATA[bsc]]></category>
		<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[NGP Token]]></category>
		<category><![CDATA[pancakeswap]]></category>
		<category><![CDATA[Smart Contract Attack]]></category>
		<category><![CDATA[Token Vulnerability]]></category>
		<category><![CDATA[tornado cash]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=51504</guid>

					<description><![CDATA[<p>The NGP token, listed on BSC, was targeted by a hack worth $2 million just a few hours ago. The incident occurred due to critical security vulnerabilities in the token’s design. The attack caused NGP’s price to drop 88% within just one hour, drawing attention across the DeFi ecosystem. Ethereum’s price remained generally stable, but</p>
<p>The post <a href="https://coinengineer.net/blog/bsc-ngp-token-2m-dollar-hack-price-drop/">2 Million Dollar Hack Hits BSC Token, Price Drops 88%</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c>The <strong>NGP token</strong>, listed on <strong>BSC</strong>, was targeted by a hack worth $2 million just a few hours ago. The incident occurred due to critical security vulnerabilities in the token’s design. The attack caused NGP’s price to drop 88% within just one hour, drawing attention across the DeFi ecosystem. Ethereum’s price remained generally stable, but transfers to <a href="https://coinengineer.net/blog/?s=tornado+cash"><strong>Tornado Cash</strong></a> have sparked discussions about market security.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<h2><span data-c>Details of the NGP Token Hack</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></h2>
<p><span data-c>The attacker manipulated the price using the PancakeSwap BUSD-NGP pool after buying NGP tokens at low prices. During this process, the maximum purchase limit and buyer waiting time were bypassed using a “DEAD” address. Subsequently, BUSD was withdrawn, draining the liquidity pool. This caused a sudden spike in <strong>NGP token price</strong> while resulting in a total loss of $2 million.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-c>Notably, the attacker transferred 443.8 ETH of the stolen funds to Tornado Cash. This move made tracing the transactions difficult and complicated fund recovery further.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-51505 size-full" src="https://coinengineer.net/blog/wp-content/uploads/2025/09/ngp-hack-tornado-cash.png" alt="" width="666" height="630" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/09/ngp-hack-tornado-cash.png 666w, https://coinengineer.net/blog/wp-content/uploads/2025/09/ngp-hack-tornado-cash-300x284.png 300w" sizes="(max-width: 666px) 100vw, 666px" /></p>
<h2><span data-c>Critical Vulnerabilities in Token Design</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></h2>
<p><span data-c>The NGP token attack exploited two main security flaws:</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<ul>
<li><span data-c>Purchase Limit Bypass: Using the “DEAD” address as the buyer allows bypassing the maximum purchase rule.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></li>
<li><span data-c>Price Manipulation During Sale: Contract synchronization during token sales reflects deducted fees, momentarily inflating the token price.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></li>
<li><span data-c>These vulnerabilities enabled the attacker to manipulate prices through large-volume transactions.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></li>
</ul>
<h2><span data-c>Market Impact and Security Measures Post-Attack</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></h2>
<p><span data-c>The hack highlights the importance of robust security measures in the DeFi ecosystem. Experts recommend strict control of purchase and sale limits in smart contracts and restricting the use of special addresses. Additionally, contract synchronization mechanisms should be secured against potential attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</p>
<p>The post <a href="https://coinengineer.net/blog/bsc-ngp-token-2m-dollar-hack-price-drop/">2 Million Dollar Hack Hits BSC Token, Price Drops 88%</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bsc-ngp-token-2m-dollar-hack-price-drop/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/09/hacker-eth-ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/09/hacker-eth-ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Breaking: Sui-Based DeFi Platform Hacked!</title>
		<link>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/</link>
					<comments>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 08:07:31 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[cross-chain risk]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto vulnerability]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[defi platform]]></category>
		<category><![CDATA[Ethereum bridge]]></category>
		<category><![CDATA[smart contract exploit]]></category>
		<category><![CDATA[sui network]]></category>
		<category><![CDATA[USDC theft]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=50434</guid>

					<description><![CDATA[<p>Today, Nemo Protocol, a Sui-based decentralized finance (DeFi) platform, suffered a major hack, losing approximately $2.4 million in USDC. The attacker exploited a vulnerability in the platform’s smart contracts. They transferred the stolen funds to Ethereum via Arbitrum, making it difficult to trace. This incident highlights the persistent security risks in DeFi platforms and cross-chain</p>
<p>The post <a href="https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/">Breaking: Sui-Based DeFi Platform Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c>Today, <strong>Nemo Protocol</strong>, a <a href="https://coinengineer.net/blog/sui-network-announces-and-deletes-robinhood-listing-announcement/"><strong>Sui-based</strong></a> decentralized finance (DeFi) platform, suffered a major hack, losing approximately $2.4 million in USDC. The attacker exploited a vulnerability in the platform’s smart contracts. They transferred the stolen funds to Ethereum via Arbitrum, making it difficult to trace. This incident highlights the persistent security risks in DeFi platforms and cross-chain bridges.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Platform users are closely monitoring the situation to secure their assets. The Nemo Protocol team has yet to provide a detailed public statement. Meanwhile, the community seeks clarity on whether the lost funds can be recovered. Security researchers are actively investigating the attack and tracking the attacker’s wallet movements.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <img decoding="async" class="aligncenter wp-image-50435 " src="https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-1024x647.jpeg" alt="" width="678" height="428" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-1024x647.jpeg 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-300x189.jpeg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-768x485.jpeg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack.jpeg 1110w" sizes="(max-width: 678px) 100vw, 678px" /></span></p>
<h2><span data-c>Attack Details and Implications for Nemo Protocol</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Nemo Protocol allows users to deposit assets and take positions based on changing interest rates. All operations are automated through smart contracts, making the system fast and efficient. However, even minor coding errors can lead to significant losses. In this case, the attacker exploited a weak point and quickly moved the funds across different networks, evading detection.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>The scale of this single attack is concerning. <strong>DeFi hacks</strong> continue to account for a large portion of crypto losses in 2025. Every month, new incidents increase the total loss, with August alone seeing millions of dollars stolen in 16 separate attacks.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Cross-Chain Bridges: Key Vulnerabilities for DeFi</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Cross-chain bridges allow users to transfer assets between different blockchains. While convenient, these bridges concentrate large funds, making them prime targets for hackers. Attackers exploit the complexity of DeFi systems to move stolen assets across multiple networks. Cross-chain vulnerabilities remain one of the biggest security concerns in DeFi.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Developers must prioritize security measures to prevent attacks. Even sophisticated users cannot fully mitigate risks if bridge and contract vulnerabilities exist.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> channels for the latest news and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/">Breaking: Sui-Based DeFi Platform Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/08/ethereum_hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/08/ethereum_hack_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Cetus Return With Open-Source Vision After Devastating Exploit</title>
		<link>https://coinengineer.net/blog/cetus-return-with-open-source-vision-after-devastating-exploit/</link>
					<comments>https://coinengineer.net/blog/cetus-return-with-open-source-vision-after-devastating-exploit/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 07:00:15 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[binance]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[CETUS]]></category>
		<category><![CDATA[Cetus compensation]]></category>
		<category><![CDATA[Cetus DEX]]></category>
		<category><![CDATA[Cetus exploit]]></category>
		<category><![CDATA[Cetus relaunch]]></category>
		<category><![CDATA[CETUS token]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[decentralized finance]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[DeFi security]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Liquidity Pools]]></category>
		<category><![CDATA[open-source protocol]]></category>
		<category><![CDATA[sui]]></category>
		<category><![CDATA[SUI blockchain]]></category>
		<category><![CDATA[Sui Foundation]]></category>
		<category><![CDATA[USDC loan]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43951</guid>

					<description><![CDATA[<p>Sometimes a single event can shake an entire ecosystem. In May, the crypto world witnessed one of those moments when Cetus, a Sui-native DEX, was exploited for $220 million. Now, it’s not just making a comeback — it’s rewriting its future. The new direction? Open-source development, stronger security, and a commitment to compensate users. Vulnerability</p>
<p>The post <a href="https://coinengineer.net/blog/cetus-return-with-open-source-vision-after-devastating-exploit/">Cetus Return With Open-Source Vision After Devastating Exploit</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="3037" data-end="3284">Sometimes a single event can shake an entire ecosystem. In May, the crypto world witnessed one of those moments when <strong data-start="3154" data-end="3163">Cetus</strong>, a <strong data-start="3167" data-end="3174">Sui</strong>-native DEX, was exploited for $220 million. Now, it’s not just making a comeback — it’s rewriting its future.</p>
<p data-start="3286" data-end="3386">The new direction? Open-source development, stronger security, and a commitment to compensate users.</p>
<h2 data-start="3388" data-end="3446">Vulnerability Patched, Open-Source Future Unveiled</h2>
<p data-start="3448" data-end="3634">On May 22, attackers took advantage of a flaw in <strong data-start="3497" data-end="3506">Cetus</strong>&#8216; pricing mechanism, draining major liquidity pools. Fortunately, $162 million worth of stolen assets were frozen shortly after.</p>
<hr />
<p data-start="3636" data-end="3876"><em>You Might Be Interested In: <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></span></em></p>
<hr />
<p data-start="3636" data-end="3876">In a June 7 statement, the team revealed that they&#8217;ve not only patched the vulnerability but are also transitioning to an open-source model. A new white hat bounty program is launching to crowdsource contributions to security and stability.</p>
<p data-start="3636" data-end="3876"><img decoding="async" class="aligncenter wp-image-157835 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/06/cetus.jpeg" alt="cetus" width="482" height="584" /></p>
<h2 data-start="3878" data-end="3930">Liquidity Restored Through Multiple Channels</h2>
<p data-start="3932" data-end="4209">To resume operations, <strong data-start="3954" data-end="3963">Cetus</strong> replenished its liquidity using $7 million in cash reserves, a $30 million USDC loan from the <strong data-start="4058" data-end="4065">Sui Foundation</strong>, and partial recovery of the stolen funds. Recovery rates for affected pools range from 85% to 99%, depending on the drain severity.</p>
<p data-start="4211" data-end="4412">As part of a user compensation strategy, 15% of <strong>CETUS</strong> token supply has been allocated. While 5% will be distributed immediately, the remaining 10% will unlock linearly over 12 months, starting June 10.</p>
<h2 data-start="4414" data-end="4464">Legal Action Underway As Security Tightens</h2>
<p data-start="4466" data-end="4743">Though a $6 million white hat bounty was initially offered, the attacker has started laundering funds, prompting <strong data-start="4579" data-end="4588">Cetus</strong> to pursue legal action across multiple jurisdictions. Law enforcement agencies are actively involved, and the team remains confident about asset recovery.</p>
<p data-start="4745" data-end="4864">Security audits are being ramped up again as <strong data-start="4790" data-end="4799">Cetus</strong> aims to win back user trust through transparency and resilience.</p>
<hr />
<p data-start="4745" data-end="4864"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <span style="color: #0000ff;"><a href="https://t.me/coinengineernews">Telegram</a><span style="color: #000000;">,</span> <a style="color: #0000ff;" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow">YouTube</a></span><span style="color: #000000;">,</span> and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><span style="color: #0000ff;">Twitter</span></a> channels for the latest<span style="color: #0000ff;"> <a style="color: #0000ff;" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a></span> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/cetus-return-with-open-source-vision-after-devastating-exploit/">Cetus Return With Open-Source Vision After Devastating Exploit</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/cetus-return-with-open-source-vision-after-devastating-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/cetus-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/cetus-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>BREAKING: Cryptocurrency Exchange WazirX Suffers $234 Million Hack</title>
		<link>https://coinengineer.net/blog/breaking-cryptocurrency-exchange-wazirx-suffers-234-million-hack/</link>
					<comments>https://coinengineer.net/blog/breaking-cryptocurrency-exchange-wazirx-suffers-234-million-hack/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 18 Jul 2024 08:14:04 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[cryptocurrency hack]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[Ethereum hack]]></category>
		<category><![CDATA[stolen crypto]]></category>
		<category><![CDATA[TornadoCash]]></category>
		<category><![CDATA[WazirX]]></category>
		<category><![CDATA[WazirX hack]]></category>
		<guid isPermaLink="false">https://coinengineer.io/?p=25356</guid>

					<description><![CDATA[<p>Major cryptocurrency exchange WazirX has reportedly been hacked, with over $234 million stolen. According to data from cybersecurity firm CYVERS, WazirX&#8217;s Safe Multisig wallet on the Ethereum network was compromised. The attackers reportedly transferred a total of $234.9 million to a new address, with each transaction originating from a TornadoCash-funded account. Blockchain security company PeckShield</p>
<p>The post <a href="https://coinengineer.net/blog/breaking-cryptocurrency-exchange-wazirx-suffers-234-million-hack/">BREAKING: Cryptocurrency Exchange WazirX Suffers $234 Million Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Major cryptocurrency exchange WazirX has reportedly been hacked, with over $234 million stolen.</p>
<p>According to data from cybersecurity firm CYVERS, WazirX&#8217;s Safe Multisig wallet on the Ethereum network was compromised. The attackers reportedly transferred a total of $234.9 million to a new address, with each transaction originating from a TornadoCash-funded account.</p>
<p><a href="https://coinengineer.net/blog/icp-hub-sahara-encourages-blockchain-adoption-in-nigeria/">Blockchain</a> security company PeckShield also confirmed the exploit through a recent tweet. Reports suggest the attackers are swapping stolen assets like PEPE, GALA, and USDT to Ethereum (ETH) and potentially continuing swaps with other cryptocurrencies.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-129944" src="https://coinmuhendisi.com/blog/wp-content/uploads/2024/07/image.png" alt="" width="582" height="827" /></p>
<p>The post <a href="https://coinengineer.net/blog/breaking-cryptocurrency-exchange-wazirx-suffers-234-million-hack/">BREAKING: Cryptocurrency Exchange WazirX Suffers $234 Million Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/breaking-cryptocurrency-exchange-wazirx-suffers-234-million-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/10/tempory-35.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/10/tempory-35.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Lazarus Group Targets DeFi via Fake Fenbushi Capital Profile on LinkedIn, Says SlowMist</title>
		<link>https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/</link>
					<comments>https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Mon, 29 Apr 2024 14:15:39 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[lazarus hack]]></category>
		<category><![CDATA[SlowMist]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=19134</guid>

					<description><![CDATA[<p>SlowMist, a security firm, expressed concern about North Korean Lazarus Group posing as a managing member of Fenbushi Capital, a Chinese blockchain asset management company, on LinkedIn. The group is known for impersonating investors to target prominent DeFi projects. According to SlowMist&#8217;s chief information security officer, a hacker from Lazarus Group created a fake LinkedIn</p>
<p>The post <a href="https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/">Lazarus Group Targets DeFi via Fake Fenbushi Capital Profile on LinkedIn, Says SlowMist</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>SlowMist</strong>, a security firm, expressed concern about North Korean <strong>Lazarus</strong> <strong>Group</strong> posing as a managing member of Fenbushi Capital, a Chinese blockchain asset management company, on LinkedIn. The group is known for impersonating investors to target prominent DeFi projects.</p>
<p>According to SlowMist&#8217;s chief information security officer, a hacker from Lazarus Group created a <a href="https://coinengineer.net/blog/doj-rejects-tornado-cash-developers-bid-to-dismiss-indictment/">fake</a> LinkedIn profile under the name &#8220;Nevil Bolson&#8221; claiming to be the co-founder of Fenbushi Capital. It was determined that the profile picture used by the fraudster belonged to the real Fenbushi Capital partner Remington Ong.</p>
<p>It has been confirmed that the <a href="https://coinengineer.net/blog/millions-in-crypto-stuck-or-forgotten-in-bridge-contracts-arkham-reveals/">fake</a> LinkedIn page remains active and the fraudster is soliciting discussions from software developers. Lazarus Group often conducts private conversations on LinkedIn pretending to be an investor and then tries to schedule meetings with its targets.</p>
<p>SlowMist warns that Lazarus Group&#8217;s strategy involves gaining the victim&#8217;s trust before adding malicious links disguised as meeting invitations or event pages that, when clicked, will lead to phishing attacks.</p>
<p>By comparing IP addresses and observing similarities in attack methods, the security firm determined that &#8220;Nevil Bolson&#8221; was part of the Lazarus Group.</p>
<p>As reported by the UN Security Council, North Korea&#8217;s state-sponsored crypto hacker groups allegedly generate significant revenue for the country, a large portion of which is allocated to the development of weapons of mass destruction.</p>
<p>According to Chainalytics, approximately $1.7 billion worth of funds have been stolen from the cryptocurrency space through 231 hacks.</p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> channels for the latest news and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/">Lazarus Group Targets DeFi via Fake Fenbushi Capital Profile on LinkedIn, Says SlowMist</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/02/PlayDapp-Hack.jpeg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/02/PlayDapp-Hack.jpeg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Zunami Protocol Hit by $2.1 Million Price Manipulation Hack!</title>
		<link>https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/</link>
					<comments>https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yunus Taşlı]]></dc:creator>
		<pubDate>Mon, 14 Aug 2023 08:54:56 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Curve Finance]]></category>
		<category><![CDATA[Curve Finance hack]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[hack attack]]></category>
		<category><![CDATA[tornado cash]]></category>
		<category><![CDATA[zunami protocol]]></category>
		<category><![CDATA[zunami protocol hack]]></category>
		<category><![CDATA[zunami protocol hack attack]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=3048</guid>

					<description><![CDATA[<p>One of the most common incidents these days is hacking attacks. Just a few days after the Curve attack, there was news of an hack attack from Zunami Protocol. Although not as severe as the Curve attack, Zunami users are currently in a state of considerable uncertainty. According to the security firm PeckShield, the DeFi</p>
<p>The post <a href="https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/">Zunami Protocol Hit by $2.1 Million Price Manipulation Hack!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the most common incidents these days is <strong>hacking attacks</strong>. Just a few days after the Curve attack, there was news of an hack attack from Zunami Protocol. Although not as severe as the <strong>Curve</strong> attack, Zunami users are currently in a state of considerable uncertainty.</p>
<p>According to the security firm<strong> PeckShield</strong>, the DeFi yield aggregator Zunami Protocol has suffered an hack attack that will result in losses exceeding <strong>$2.1 million</strong>.</p>
<p>On Monday morning, PeckShield disclosed an assault involving two big transactions. PeckShield reported that the hacking of funds from Zunami Protocol occurred through the mixing service <strong>Tornado Cash</strong>.</p>
<p>Following PeckShield&#8217;s warning, the Protocol stated, &#8220;zStables seems to have faced an attack.&#8221;&#8216; However, they added that the collateral is safe and the team has started investigating.</p>
<blockquote><p>You might like: <a href="https://coinengineer.net/blog/polygon-based-y00ts-nfts-to-move-to-ethereum-2/"><strong>Polygon-based Y00TS NFTs to Move to Ethereum</strong></a></p></blockquote>
<h2>Zunami Protocol Price Manipulation Attack</h2>
<p>In a tweet, the security company pointed out that the Zunami Protocol hack exploited a price manipulation issue, which could be further leveraged through donations to inaccurately calculate the price.</p>
<p><strong>Xian Yu</strong>, the founder of <strong>SlowMist</strong>, said today that their firm detected the security vulnerability two months ago. This project fell victim to price manipulation attacks, suffering losses exceeding $2.1 million. Yu, also known as Cos, emphasized, &#8220;What&#8217;s crucial is our system identifying this risk two months ago and them informing us proactively.&#8221;</p>
<hr />
<p>You can share your opinions in the comments about the topic. Also, follow us on <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram</strong></a>, <a href="https://twitter.com/coinengineers" target="_blank" rel="noreferrer noopener"><strong>Twitter</strong></a>, and <strong><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener">YouTube</a></strong> for more content like this.</p>
<p>The post <a href="https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/">Zunami Protocol Hit by $2.1 Million Price Manipulation Hack!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/08/Zunami-Protocol-Hit-by-2.1-Million-Price-Manipulation-Hack.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/08/Zunami-Protocol-Hit-by-2.1-Million-Price-Manipulation-Hack.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
