BlockThreat - Week 10, 2025

1inch | time.fun | Garantex | Xeggex | SBF | LastPass

BlockThreat - Week 10, 2025

Greetings!

No billion-dollar exploits this week, but a couple of unusual DeFi compromises offered a break from the usual private key smash-and-grabs.

One particularly interesting case was the compromise of 1inch and a few market makers, resulting in around $5M in losses. Unlike traditional smart contract exploits, this attack resembled a memory corruption vulnerability with a carefully crafted transaction payload. You’ll find detailed write-ups, along with the rapid race to recover funds, in the premium hacks section below. Fortunately, the attacker agreed to a $450K “bug bounty,” allowing 1inch and the affected AMM to recover most of their losses. The key takeaway? Overoptimized Solidity/Yul contracts are notoriously difficult to audit and secure.

To gain access to comprehensive vulnerability write-ups, post-mortems, exploit proof of concepts (PoCs), attacker addresses, and additional data regarding this week’s compromises, please subscribe to the premium plan below.

Things got even more intriguing with a whitehat hack by shouccc and tonykebot targeting Time.fun’s backend. A clever exploit of the backend infrastructure—one that eagerly signed transactions on Solana—allowed them to drain all funds controlled by the internal wallet. Fortunately, all funds were returned.

On a more personal front, I will be working on the newsletter full time now. Please consider becoming a premium member to help support its future development.

Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Contests

Media

Research

Tools

Hacks

Pump

Date: March 04, 2025
Attack Vector: Price Oracle Manipulation
Impact: $6,400
Chain: BSC

References:

https://x.com/TenArmorAlert/status/1897115993962635520

https://x.com/SlowMist_Team/status/1897120233481207971

https://x.com/0xNickLFranklin/status/1897168181862785104

https://x.com/TikkalaResearch/status/1896961176606753219

Exploit:

https://bscscan.com/tx/0xdebaa13fb06134e63879ca6bcb08c5e0290bdbac3acf67914c0b1dcaf0bdc3dd

time.fun, Time

Date: March 04, 2025
Attack Vector: Backend injection
Impact: Assets Stolen
Chain: Solana

References:

https://x.com/publicqi/status/1897124894229639418

Exploit:

1inch, Trusted Volumes

Date: March 06, 2025
Attack Vector: Function Parameter Validation
Impact: $5,000,000 (Recovered $4,550,000)
Chain: Ethereum

References:

https://x.com/TenArmorAlert/status/1897474716492812458

https://x.com/TikkalaResearch/status/1897728336941789428

https://x.com/1inch/status/1897695348232978770https://x.com/SlowMist_Team/status/1897945772307759483

https://x.com/tikkalaresearch/status/1897728336941789428

https://blog.decurity.io/yul-calldata-corruption-1inch-postmortem-a7ea7a53bfd9

Recovery:

https://x.com/shoucccc/status/1897954751205327040

https://etherscan.io/idm?addresses=0xbbb587e59251d219a7a05ce989ec1969c01522c0%2C0x1ef9bfb1e7480c01d3d00e9bca5f29625c6c4806&type=1

Exploit:

https://etherscan.io/tx/0x04975648e0db631b0620759ca934861830472678dae82b4bed493f1e1e3ed03a

https://etherscan.io/tx/0xb5c94efa0c8fd8f5c8cc2826e374a99620b01061d395b59b8f45dddc9fce1c60

https://etherscan.io/tx/0xb16bbf03d324b66685c94d62dbe31c739ee23c114b3915d169c74cd7c98eec8c

https://etherscan.io/tx/0xc69b4c8029c70ae468e92af31120ac6b01bb89c6e35d34818413e9942aedebb6

https://etherscan.io/tx/0xefcb740bf9ec17ed99839ffcc05393fae5ec2d44149aee91ba119f48bc20a1ef

https://etherscan.io/tx/0x74bc4d5dc7f8da468788da6087bb9f73465966ab5b8cf9cf1053d98e78a9bf96

https://etherscan.io/tx/0x3947e5a4d98104e313e08ee321673e1183db3d6ff8b7207f3eabb36f71436c1d

https://etherscan.io/tx/0x9ce5187c7160f531189e4765f21af5975dc2a62d961fb61ae09866d082918256

https://etherscan.io/tx/0xb0688eb1f46c28f36d7397366146fced23d3f8da7e08b760a5f612ce134ee9d2

https://etherscan.io/tx/0x62734ce80311e64630a009dd101a967ea0a9c012fabbfce8eac90f0f4ca090d6

Unkn_d8da9d

Date: March 09, 2025
Attack Vector: Arbitrary External Calls
Impact: $140,000
Chain: Arbitrum

References:

https://x.com/CertiKAlert/status/1898933348069933537

Exploit:

https://arbiscan.io/tx/0x3248bc2271d42fc4ab47567de50d2913e76030f0cc70a8dbc0571137b936ef77