BlockThreat - Week 13, 2025
NickLFranklin | Abracadabra | SIR | Hyperliquid | Jelly | Alkimiya
Greetings!
A tough week in blockchain security. More than $20M was stolen across five protocols this week. We’ll dive into a few case studies shortly, but first, we need to cover something even more concerning—the latest DPRK campaign.
DPRK’s Long Game: A Security Researcher Turned Threat Actor
It’s time to update your project’s threat models. Last week, it was revealed that a fairly well-known blockchain security researcher, Nick L Franklin, was actually a North Korean threat actor. His goal? Not just to infiltrate projects but also to compromise security researchers themselves.
For over a year, “Nick” built trust within the community—regularly posting analyses of recent compromises and engaging with researchers. Only recently did he begin exploiting these connections by sharing malware-laced vulnerability reports. Here are some key takeaways from this latest threat:
- DPRK actors are playing an even longer game. We already knew they were patient, but this level of dedication is unprecedented. Be cautious—trust is their weapon.
- DPRK has smart contract exploitation capabilities but uses them selectively—such as in the original Radiant Capital compromise last January. The next smart contract exploit could be DPRK-linked.
- OpenZeppelin, Hyperliquid, 1inch, and others appear to be on DPRK’s target list. “Nick” inquired about them, confirming previous warnings from Tay. A potential mass supply chain attack through OpenZeppelin is particularly concerning, lock down those dependencies.
- Security researchers including SEAL team are now targets. Just as DPRK targets traditional infosec pros, they’re now actively targeting blockchain security researchers—likely to gain early insights into unpatched vulnerabilities. Our community is collaborative, but be wary of unsolicited PoC reviews or vulnerability reports.
If you ever feel bad about being deceived by these actors, know that even experienced researchers—including myself—have been caught off guard. Stay vigilant!
Exploits in DeFi: New Attack Techniques Emerging
Several high-profile exploits shook DeFi this week. Here are some of the most notable:
- SIR Trading ($355K loss): This hack leveraged the newly introduced EVM transient storage feature. The attacker exploited a collision between the pool address and transfer amount, using a vanity address to overwrite the amount. A clever and novel technique.
- Abracadabra ($13M loss): Hit by a complex borrowing/liquidation exploit resembling past Euler and KyberSwap compromises. Stolen funds remain scattered across multiple addresses and haven’t been laundered yet. Abracadabra is offering a massive 25% bounty—let’s see if the attacker takes it.
Detailed breakdowns of these and other exploits—Hyperliquid/Jelly, Alkimiya, and more—are available in the premium section.
Before we dive into the news, a special thank you to this week’s sponsor—Recon. You’re likely already familiar with their groundbreaking research on invariant testing by Nican0r and the team, who in fact is featured in the tools section below.
Get a Recon Invariant Audit: a powerful testing suite plus world-class auditors to catch what others miss. Open-source, no vendor lock-in, and proven to find severe bugs. Before spending millions on audits, invest in tests that evolve over time that catch bugs and keep them from coming back.
See our portfolio: https://getrecon.xyz/#services.

Let’s dive into the news!
News
- DeFi security researcher implicated in $50M Radiant Capital hack. The Nick L. Franklin personae was developed for over a year with regular posts about DeFi compromises until it all came crashing down with a malware laced phishing attempt of the 1inch co-founder. Further investigation revealed that Nick L. Franklin was linked to the $58M Radiant Capital hack in October, 2024, asking for technical support for the hack, and actively trying to infiltrate other DeFi projects.
- From One North Korean To Four North Koreans To Five Threats by blackbigswan. The Nick L. Franklin saga continues with a whole squad of fake identities, job hunts, exploits, phishing, rug pulls, and other attacks.
- Chainalysis Sued For Deception In Celsius Scam.
- Infini takes legal action after $50 million stablecoin exploit.
Crime
- US Marshals arrest Veer Chetal ‘Wiz,’ third suspect in $240M Genesis creditor crypto scam. Veer was part of the gang responsible for the massive social engineering heist last year. Congrats ZachXBT!
- Exposing pDai exploiter's identity by Martin.
- DOJ Seizes USD 8.2M Tied to Pig Butchering Scheme by TRM.
- Binance suspends employee for allegedly profiting off of insider information.
- Binance kicks out a MOVE market maker caught inflating the token.
- Darkweb actors claim to have over 100K of Gemini, Binance user info. These usually consist of recycled emails from past compromises.
- T3 FCU Freezes Nearly $9 Million Linked to Record-Breaking Bybit Hack, Bringing Crime Unit’s Total to Over $150 Million.
- Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup by Hayato Sasaki (JPCERT).
Phishing
- SEAL Releases Advisory on ELUSIVE COMET. A threat actor enticing victims to install malware during Zoom calls by presenting themselves as legitimate media entities such as Aureon Press, The OnChain Podcast.
Policy
- US Treasury argues no need for final court judgment in Tornado Cash case.
- SEC formally dismisses enforcement action against Kraken, Consensys and Cumberland DRW.
- President Trump Pardons Arthur Hayes, BitMEX and 3 Other Co-Founders and Employee.
Scams
- The Biggest Crypto Scams of 2024 by Nefture Security.
- Coinbase user reportedly scammed of $34 million in Bitcoin: ZachXBT.
Malware
- Hijacked NPM Packages: The New Cyber Weapon Against Crypto and Web3 Gaming by Cyber Strategy Institute.
- Exposing Crocodilus: New Device Takeover Malware Targeting Android Devices by Threat Fabric. A new threat stealing banking and crypto credentials.
Media
- bountyhunt3rz - Episode 8 - nnez.
Research
- 1inch's AML screening tools for Web3 security by 1inch.
- Building an Institutional-Grade Security Posture at Gauntlet by Ryan Wegner (Gauntlet).
- coSNARKs: An Introduction by Hector Perez (ZKV).
- In-Depth Discussion on EIP-7702 and Best Practices by SlowMist.
- A Realistic Breakdown of Optimism - Part 2 by Trust Security.
- Hacker’s Perspective: How to Say Hi to CZ with 0.01 BNB by SlowMist.
- Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects by Avi Weinstock (Zellic).
- Unraveling a Curious Edge Case in EigenLayer's Slashing Accounting by EllipticPoint (Sigma Prime).
- How to drain an entire lending protocol when a new asset is accepted as collateral by Kankodu. A deep dive into a familiar genesis pool issue in Cairo.
- The Journey of a Smart Contract by gojo.
- Large Language Models for Blockchain Security: A Systematic Literature Review.
- Enhanced Smart Contract Reputability Analysis using Multimodal Data Fusion on Ethereum.
- On-Chain Analysis of Smart Contract Dependency Risks on Ethereum.
- Unveiling Latent Information in Transaction Hashes: Hypergraph Learning for Ethereum Ponzi Scheme Detection.
- A Practical Rollup Escape Hatch Design.
- Enhanced Smart Contract Reputability Analysis using Multimodal Data Fusion on Ethereum.
- Detecting Functional Bugs in Smart Contracts through LLM-Powered and Bug-Oriented Composite Analysis.
Tools
- How to: Use Signal by EFF.
- Chimera App V2 by Nican0r.
Hacks
Polymarket
Date: March 25, 2025
Attack Vector: Governance
Impact: $7,000,000
References:
https://x.com/Web3Marmot/status/1904501360558817324
https://x.com/wublockchain/status/1904772495649235117
Abracadabra
Date: March 25, 2025
Attack Vector: Reward Manipulation
Impact: $13,000,000
Chain: Arbitrum
References:
https://x.com/CyversAlerts/status/1904509755143418003
https://x.com/peckshield/status/1904501599848038490
https://x.com/GMX_IO/status/1904509326129238479https://x.com/MIM_Spell/status/1904818549257822687
Analysis:
https://x.com/hklst4r/status/1904541046643495240
https://docs.google.com/spreadsheets/d/1VzOwlKbYjbfmTI0VXCH6CngCQT3QUBAxxZskAvVDjxg/edit?gid=0#gid=0
https://x.com/threesigmaxyz/status/1904540690878545954
https://securrtech.medium.com/the-gmx-and-mim-spell-hack-a-13-million-exploit-unpacked-ebb4d6c63c38
https://rekt.news/abracadabra-rekt2
https://www.certik.com/resources/blog/magic-internet-money-mim-incident-analysis
Recovery:
Exploit:
https://arbiscan.io/tx/0xed17089aa6c57b7d5461209e853bdb56bc3460a91805e20d2590609a515ef0b0
Hyperliquid, Jelly Token
Date: March 26, 2025
Attack Vector: Economic Attack
Impact: Assets Stolen
Chain: Hyperliquid
References:
https://x.com/arkham/status/1905003319069688095
https://rekt.news/hyperliquidate2
https://cointelegraph.com/news/timeline-jelly-token-exploit-hyperliquid
Alkimiya
Date: March 28, 2025
Attack Vector: Rounding Error
Impact: $95,500
Chain: Ethereum
References:
https://x.com/TenArmorAlert/status/1906371419807568119
Exploit:
https://etherscan.io/tx/0x9b9a6dd05526a8a4b40e5e1a74a25df6ecccae6ee7bf045911ad89a1dd3f0814
https://github.com/SunWeb3Sec/DeFiHackLabs/blob/main/src/test/2025-03/Alkimiya_io_exp.sol
SIR
Date: March 30, 2025
Attack Vector: Function Parameter Injection
Impact: $355,000
Chain: Ethereum
References:
https://x.com/SlowMist_Team/status/1906722264059674893
https://x.com/TenArmorAlert/status/1906268185046745262
https://x.com/TikkalaResearch/status/1906807103525953861
https://blog.solidityscan.com/synthetics-implemented-right-sir-hack-analysis-837d328c4c30
Exploit:
https://etherscan.io/tx/0xa05f047ddfdad9126624c4496b5d4a59f961ee7c091e7b4e38cee86f1335736f