BlockThreat - Week 31, 2025

Multichain | SuperRare | Tornado Cash | Samourai Wallet | Monero

BlockThreat - Week 31, 2025

Greetings!

The spotlight remains on the Samourai Wallet and Tornado Cash trials, with the Samourai defendants pleading guilty while Roman Storm continues to fight for the freedom to write code. A new trend is emerging as chain operators like Base and Arbitrum begin investing in ecosystem security, subsidizing code audits for projects building on their networks. Just a couple of compromises this week, both stemming from careless bugs and netting attackers just over $2M. Let’s take a closer look.

Users continue to fall victim to exploits long after major breaches because permission revocation is often neglected. The Multichain Router (formerly AnySwap) vulnerability from 2022 allowed attackers to bypass intended permission checks and drain funds from wallets that still had lingering approvals, even on chains where the router was no longer active. In one recent case a well-known MEV bot front-ran the theft and inadvertently rescued 401 ETH. Someone got really lucky here! So pretty please, with a sugar on top, revoke your approvals at revoke.cash.

Speaking of user and wallet security be sure to thank this week’s sponsor Coinspect.


Coinspect’s Wallet Security Ranking is an objective, transparent, and regularly updated evaluation of leading cryptocurrency wallets. It focuses on critical security features like anti-phishing defenses, transaction clarity, and protection against blind signing, helping users choose wallets that prioritize their safety.

Link: https://www.coinspect.com/wallets/


You’d think after countless smart contract disasters, fundamentals like permission checks would be bullet proof but SuperRare’s staking contract proves otherwise. A simple mistake in the updateMerkleRoot function allowed anyone to hijack critical staking logic and drain $730K worth of RARE tokens:

function updateMerkleRoot(bytes32 newRoot) external override {
    if (
        (msg.sender != owner() &&
            msg.sender !=
            address(0xc2F394a45e994bc81EfF678bDE9172e10f7c8ddc))
    ) revert NotAuthorized();

It took attackers about two weeks to discover and exploit this completely preventable and careless vulnerability.

Let’s dive into the news!

Events

News

Crime

Policy

  • GENIUS or Gimmick by Rekt. An exploration of unwanted centralization effects of the GENIUS act.

Phishing

Malware

Media

Research

Tools

Hacks

SuperRare

Date: July 28, 2025
Attack Vector: Insufficient Function Access Control
Impact: $730,000
Chain: Ethereum

References:

https://x.com/SlowMist_Team/status/1949770231733530682
https://x.com/CyversAlerts/status/1949766758635610276
https://x.com/PeckShieldAlert/status/1949764035408527414
https://x.com/Phalcon_xyz/status/1949780457786351991
https://x.com/SuplabsYi/status/1949782448017199517
https://x.com/AMLBotHQ/status/1949851459216150754
https://blog.solidityscan.com/superrare-hack-analysis-488d544d89e0

Exploit:

https://etherscan.io/tx/0xd813751bfb98a51912b8394b5856ae4515be6a9c6e5583e06b41d9255ba6e3c1

Unkn_670471

Date: July 29, 2025
Attack Vector: Insufficient Function Access Control
Impact: $2,000
Chain: Ethereum

References:

https://x.com/TikkalaResearch/status/1950254795815866867

Exploit:

https://etherscan.io/tx/0x6a2a9f48ff78966cb44772c3551a56d7c5b788168f81cae8d06006c79a86fc16

Multichain User, Multichain aka Anyswap

Date: July 29, 2025
Attack Vector: Forgotten approval
Impact: $1,500,000
Chain: Ethereum

References:

https://x.com/shoucccc/status/1950310650510791168
https://x.com/TalBeerySec/status/1950470423293886685
https://dune.com/talbeerysec/Multichain-hack
https://revoke.cash/exploits/multichain?chainId=1
https://dedaub.com/blog/phantom-functions-and-the-billion-dollar-no-op/

Exploit:

https://etherscan.io/tx/0x75316e0aac282c9db5c57d2abe74e29e072466114afb8d70cd8b7115196fca57