BlockThreat - Week 13, 2025

NickLFranklin | Abracadabra | SIR | Hyperliquid | Jelly | Alkimiya

BlockThreat - Week 13, 2025

Greetings!

A tough week in blockchain security. More than $20M was stolen across five protocols this week. We’ll dive into a few case studies shortly, but first, we need to cover something even more concerning—the latest DPRK campaign.

DPRK’s Long Game: A Security Researcher Turned Threat Actor

It’s time to update your project’s threat models. Last week, it was revealed that a fairly well-known blockchain security researcher, Nick L Franklin, was actually a North Korean threat actor. His goal? Not just to infiltrate projects but also to compromise security researchers themselves.

For over a year, “Nick” built trust within the community—regularly posting analyses of recent compromises and engaging with researchers. Only recently did he begin exploiting these connections by sharing malware-laced vulnerability reports. Here are some key takeaways from this latest threat:

  • DPRK actors are playing an even longer game. We already knew they were patient, but this level of dedication is unprecedented. Be cautious—trust is their weapon.
  • DPRK has smart contract exploitation capabilities but uses them selectively—such as in the original Radiant Capital compromise last January. The next smart contract exploit could be DPRK-linked.
  • OpenZeppelin, Hyperliquid, 1inch, and others appear to be on DPRK’s target list. “Nick” inquired about them, confirming previous warnings from Tay. A potential mass supply chain attack through OpenZeppelin is particularly concerning, lock down those dependencies.
  • Security researchers including SEAL team are now targets. Just as DPRK targets traditional infosec pros, they’re now actively targeting blockchain security researchers—likely to gain early insights into unpatched vulnerabilities. Our community is collaborative, but be wary of unsolicited PoC reviews or vulnerability reports.

If you ever feel bad about being deceived by these actors, know that even experienced researchers—including myself—have been caught off guard. Stay vigilant!

Exploits in DeFi: New Attack Techniques Emerging

Several high-profile exploits shook DeFi this week. Here are some of the most notable:

  • SIR Trading ($355K loss): This hack leveraged the newly introduced EVM transient storage feature. The attacker exploited a collision between the pool address and transfer amount, using a vanity address to overwrite the amount. A clever and novel technique.
  • Abracadabra ($13M loss): Hit by a complex borrowing/liquidation exploit resembling past Euler and KyberSwap compromises. Stolen funds remain scattered across multiple addresses and haven’t been laundered yet. Abracadabra is offering a massive 25% bounty—let’s see if the attacker takes it.

Detailed breakdowns of these and other exploits—Hyperliquid/Jelly, Alkimiya, and more—are available in the premium section.

Before we dive into the news, a special thank you to this week’s sponsor—Recon. You’re likely already familiar with their groundbreaking research on invariant testing by Nican0r and the team, who in fact is featured in the tools section below.


Get a Recon Invariant Audit: a powerful testing suite plus world-class auditors to catch what others miss. Open-source, no vendor lock-in, and proven to find severe bugs. Before spending millions on audits, invest in tests that evolve over time that catch bugs and keep them from coming back.

See our portfolio: https://getrecon.xyz/#services.


Let’s dive into the news!

News

Crime

Phishing

Policy

Scams

Malware

Media

Research

Tools

Hacks

Polymarket

Date: March 25, 2025
Attack Vector: Governance
Impact: $7,000,000

References:

https://www.theblock.co/post/348171/polymarket-says-governance-attack-by-uma-whale-to-hijack-a-bets-resolution-is-unprecedented

https://x.com/Web3Marmot/status/1904501360558817324

https://x.com/wublockchain/status/1904772495649235117

Abracadabra

Date: March 25, 2025
Attack Vector: Reward Manipulation
Impact: $13,000,000
Chain: Arbitrum

References:

https://x.com/CyversAlerts/status/1904509755143418003

https://x.com/peckshield/status/1904501599848038490

https://x.com/GMX_IO/status/1904509326129238479https://x.com/MIM_Spell/status/1904818549257822687

Analysis:

https://x.com/hklst4r/status/1904541046643495240

https://mirror.xyz/0x5744b051845B62D6f5B6Db095cc428bCbBBAc6F9/G5sa_jDZFUZSxw_b8sEE7lOSBcb2t5FfwfASOIixtoA

https://docs.google.com/spreadsheets/d/1VzOwlKbYjbfmTI0VXCH6CngCQT3QUBAxxZskAvVDjxg/edit?gid=0#gid=0

https://x.com/threesigmaxyz/status/1904540690878545954

https://securrtech.medium.com/the-gmx-and-mim-spell-hack-a-13-million-exploit-unpacked-ebb4d6c63c38

https://rekt.news/abracadabra-rekt2

https://www.certik.com/resources/blog/magic-internet-money-mim-incident-analysis

Recovery:

https://mirror.xyz/0x5744b051845B62D6f5B6Db095cc428bCbBBAc6F9/25X2JijzhkFK6oCC5oARNuVew5pyGZ1hGbMQ4Qu4kxQ

Exploit:

https://arbiscan.io/tx/0xed17089aa6c57b7d5461209e853bdb56bc3460a91805e20d2590609a515ef0b0

Hyperliquid, Jelly Token

Date: March 26, 2025
Attack Vector: Economic Attack
Impact: Assets Stolen
Chain: Hyperliquid

References:

https://x.com/arkham/status/1905003319069688095

https://rekt.news/hyperliquidate2

https://cointelegraph.com/news/timeline-jelly-token-exploit-hyperliquid

Alkimiya

Date: March 28, 2025
Attack Vector: Rounding Error
Impact: $95,500
Chain: Ethereum

References:

https://x.com/TenArmorAlert/status/1906371419807568119

Exploit:

https://etherscan.io/tx/0x9b9a6dd05526a8a4b40e5e1a74a25df6ecccae6ee7bf045911ad89a1dd3f0814

https://github.com/SunWeb3Sec/DeFiHackLabs/blob/main/src/test/2025-03/Alkimiya_io_exp.sol

SIR

Date: March 30, 2025
Attack Vector: Function Parameter Injection
Impact: $355,000
Chain: Ethereum

References:

https://x.com/SlowMist_Team/status/1906722264059674893

https://x.com/TenArmorAlert/status/1906268185046745262

https://x.com/TikkalaResearch/status/1906807103525953861

https://blog.solidityscan.com/synthetics-implemented-right-sir-hack-analysis-837d328c4c30

https://slowmist.medium.com/fatal-residue-an-on-chain-heist-triggered-by-transient-storage-10909e4a255a

Exploit:

https://etherscan.io/tx/0xa05f047ddfdad9126624c4496b5d4a59f961ee7c091e7b4e38cee86f1335736f