BlockThreat - Week 26, 2025

Resupply | Silo Finance | printMoney MEV Bot | Stead Token

BlockThreat - Week 26, 2025

Greetings!

More than $12 million was stolen this week across four incidents, with Resupply and Silo Finance suffering multi-million dollar losses. The Resupply hack is particularly notable where $9.8 million was drained due to a recurring vulnerability in which an empty market is exploited via a rounding error to mint excessive protocol tokens. Since the 2023 Hundred Finance hack, this vulnerability class has now accounted for over $51 million in losses, as developers continue to learn the painful lesson that newly deployed markets demand extra care, especially around math precision and initial liquidity. The incident also triggered the now-familiar cascade of finger-pointing further fueling drama across the ecosystem.

The remaining compromises were just as easily preventable. An MEV bot called printMoney lost $2 million due to insufficient function access control, while Silo Finance lost over $500,000 because of poor function parameter validation. These are well-known and well-documented issues. If you haven’t already, check out the recently released DeFi Top 10 Attack Vectors where these two categories appear on the list year after year, consistently causing millions in damages.

If you’re a developer and don’t feel fully confident in preventing these types of bugs, check out this week’s sponsor - Oak Security, a trusted auditor behind some of the ecosystem’s most unique protocols and a long-time supporter of this newsletter.


Oak Security has operated in Web3 Security since 2017, providing security services throughout a project's lifecycle. audits. This includes audits, penetration testing, operational security training, and advisory services. Our signature blinded process emphasizes redundancy: Every line of code is reviewed by multiple auditors with a multi-disciplinary background in parallel.

Link: https://www.oaksecurity.io/


In other news, be sure to check out a new community-driven project Unphishable from the good folks at DeFi Hack Labs, ScamSniffer, and SlowMist. It’s a series of interactive challenges designed to teach users how to spot and avoid common Web3 phishing attacks. The project simulates real-world scams involving malicious signatures, spoofed dApps, and fake support agents, giving users a low-stakes environment to train their instincts before real money is on the line. Amazing!

And while you are at it be sure to thank this week’s sponsor Coinspect for helping uplevel wallet and user security.


Coinspect’s Wallet Security Ranking is an objective, transparent, and regularly updated evaluation of leading cryptocurrency wallets. It focuses on critical security features like anti-phishing defenses, transaction clarity, and protection against blind signing, helping users choose wallets that prioritize their safety.

Link: https://www.coinspect.com/wallets/


Let’s dive into the news!

News

Crime

Policy

Phishing

Scams

Malware

Media

Research

Tools

  • Accretion Solana Data Reverser - A browser-based reverse engineering tool for analyzing hex data with deep Solana blockchain integration. Perfect for examining raw binary data, Solana account structures, and discovering patterns in blockchain data. Live tool here.

Hacks

printMoney MEV Bot

Date: June 25, 2025
Attack Vector: Insufficient Function Access Control
Impact: $2,000,000
Chain: BSC

References:

https://x.com/PeckShieldAlert/status/1937759696183873634
https://x.com/Phalcon_xyz/status/1937753560391004641

Exploit:

https://bscscan.com/tx/0x7708aaedf3d408c47b04d62dac6edd2496637be9cb48852000662d22d2131f44

Silo Finance

Date: June 25, 2025
Attack Vector: Function Parameter Validation
Impact: $546,000
Chain: Ethereum, Sonic

References:

https://x.com/CyversAlerts/status/1937894864659554680
https://silofinance.medium.com/post-mortem-unreleased-leverage-contract-exploitd-0ab8f37afcbb

Exploit:

https://etherscan.io/tx/0x1f15a193db3f44713d56c4be6679b194f78c2bcdd2ced5b0c7495b7406f5e87a
https://etherscan.io/tx/0x161a4e9bd777c81af4b2f2c4062281bf25ce460b9b04fbea83f09fba270c8b3b

Resupply

Date: June 26, 2025
Attack Vector: Rounding Error
Impact: $9,800,000
Chain: Ethereum

References:

https://x.com/Phalcon_xyz/status/1938061381288530243
https://x.com/peckshield/status/1938061948647817647
https://x.com/Phalcon_xyz/status/1938073001087652021
https://x.com/ResupplyFi/status/1938092252431036491
https://rekt.news/resupplyfi-rekt
https://mirror.xyz/0x521CB9b35514E9c8a8a929C890bf1489F63B2C84/ygJ1kh6satW9l_NDBM47V87CfaQbn2q0tWy_rtp76OI
https://blog.solidityscan.com/resupply-hack-analysis-d4e3baaa294a
https://quillaudits.medium.com/resupply-hack-how-a-donation-attack-led-to-9-5m-in-losses-91e4e34d3bf5
https://x.com/hklst4r/status/1938088811680174591

Drama:

https://x.com/HaowiWang/status/1939300119041716648
https://x.com/newmichwill/status/1939243733792252280
https://x.com/newmichwill/status/1938890462267396371
https://x.com/SlowMist_Team/status/1939938302469009683

Incident Response:

https://x.com/newmichwill/status/1938890462267396371

Exploit:

https://etherscan.io/tx/0xffbbd492e0605a8bb6d490c3cd879e87ff60862b0684160d08fd5711e7a872d3

Stead Token

Date: June 29, 2025
Attack Vector: Insufficient Function Access Control
Impact: $14,500
Chain: Arbitrum

References:

https://x.com/TenArmorAlert/status/1939508301596672036

Exploit:

https://arbiscan.io/tx/0x32dbfce2253002498cd41a2d79e249250f92673bc3de652f3919591ee26e8001