BlockThreat - Week 15, 2025

Morpho | Wayfinder | MEV | LibertyUseCase | Cosmos

BlockThreat - Week 15, 2025

Greetings!

Over $3M stolen this week across six incidents. The bulk of the losses came from the Morpho hack, which lost $2.6M due to an exploit introduced during a front-end upgrade. A misconfiguration in how users were prompted to sign transactions led one user to unknowingly sign an unlimited permit to a multicall contract—allowing anyone to drain it. Fortunately, a known whitehat MEV bot frontran the attacker.

This incident is a stark reminder: even in the world of smart contract exploits, we often overlook trust assumptions in the underlying infrastructure—including the websites that generate complex transactions for users to sign.

The remaining exploits targeted a range of systems—from vulnerable MEV bots to a nine-year-old contract left exposed and carelessly exploitable just last week. Details on each hack are available in the premium section.

One under-the-radar vulnerability report worth highlighting: Supremacy intern Yi discovered a critical flaw in Ping.pub, the Cosmos blockchain explorer. Yi found a way to compromise the hosting server including skeleton SSH keys. If we want to avoid another Wallet/Bybit hack, it’s crucial we give Web2 infra the attention they deserve.

Also notable this week: a spike in phishing campaigns targeting crypto developers via malicious npm, Python, and VS Code packages, as well as code repositories like SourceForge. Be vigilant and lock down your dependencies.

Before we dive into the news, a special thank you to this week’s sponsor—Recon.


Get a Recon Invariant Audit: a powerful testing suite plus world-class auditors to catch what others miss. Open-source, no vendor lock-in, and proven to find severe bugs. Before spending millions on audits, invest in tests that evolve over time that catch bugs and keep them from coming back.

See our portfolio: https://getrecon.xyz/#services.


Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Media

Research

Tools

Hacks

MEV_49e27d

Date: April 07, 2025
Attack Vector: Insufficient Function Access Control
Impact: $181,000
Chain: Ethereum

References:

https://x.com/SlowMist_Team/status/1909459139715023097

https://x.com/muststopye/status/1909504698568392937

https://x.com/TenArmorAlert/status/1909465828178690454

Negotiations:

https://etherscan.io/tx/0xf31130c9a9141cf0656381dca532b86e0dedeed407814dbff7ba06afebd7f526

Exploit:

https://etherscan.io/tx/0x1681c269e702ccaea4a3595037b7d1c2fa4551330451ef9c61cf1db0e63e7627

Unkn_8c6562

Date: April 08, 2025
Attack Vector: Insufficient Function Access Control
Impact: $1,600
Chain: Ethereum

References:

https://x.com/TenArmorAlert/status/1909814943290884596

Exploit:

https://etherscan.io/tx/0x08ffb5f7ab6421720ab609b6ab0ff5622fba225ba351119c21ef92c78cb8302c

Morpho

Date: April 10, 2025
Attack Vector: Misconfiguration
Impact: $2,600,000 (Recovered $2,600,000)
Chain: Ethereum

References:

https://x.com/PeckShieldAlert/status/1910584222315586044

https://x.com/MorphoLabs/status/1910534213259964571

https://x.com/MorphoLabs/status/1910597882836566100

https://x.com/coinspect/status/1910748629125521492

https://x.com/TenArmorAlert/status/1910550219206303933

https://x.com/Phalcon_xyz/status/1910594360821113136

Exploit:

https://etherscan.io/tx/0xbcb1e5f7e432cf899af665b3c9f87e24337d3570e68fa7e211c962eadd83ea60

https://etherscan.io/tx/0x5ce2cf51f0e6e099c33eabb84561cb01a1acb2c9fc26c5388cedec0e4292ce99

Wayfinder

Date: April 10, 2025
Attack Vector: Frontrunning
Impact: $200,000
Chain: Ethereum

References:

https://x.com/0x_ultra/status/1910323014853611905

https://x.com/tokentable/status/1910329521326510184

https://x.com/tokentable/status/1910637960955052139

https://www.theblock.co/post/350479/someone-built-an-mev-bot-to-frontrun-the-wayfinder-prompt-airdrop-claims-on-kaito-stealing-200000-in-eth-from-yappers

LibertyUseCase

Date: April 12, 2025
Attack Vector: Price Oracle Manipulation
Impact: $70,000
Chain: BSC

References:

https://x.com/TenArmorAlert/status/1911040262157074447

https://x.com/Phalcon_xyz/status/1911050576521236750

Exploit:

https://bscscan.com/tx/0xff77c9d0530fe6bbf6a5f24c5ddff466e0eaaa7630ecdd8cc6015c2eabf57881

Unkn_623c1c

Date: April 12, 2025
Attack Vector: Insufficient Function Access Control
Impact: $28,100
Chain: BSC

References:

https://x.com/TenArmorAlert/status/1911041324117032961

Exploit:

https://bscscan.com/tx/0x9371eb4b0da7dedc95568d508a7fc97298a27bb44947c82dc4542fe3a4e5e3c9